Skip to content

Commit

Permalink
Update README.md
Browse files Browse the repository at this point in the history
  • Loading branch information
Virgula0 committed Sep 21, 2018
1 parent 0f8f759 commit a18e1e1
Showing 1 changed file with 9 additions and 1 deletion.
10 changes: 9 additions & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,19 +14,27 @@ As you can see you will get all WPS PIN possible for your router calculated with
After that you can save the results in a txt, then you have to indicate the path to TheReaver Program when it asks "Insert Pin File (DEFAULT Pins in db):".

Program will automatically recognize the format of the input and will begin to try all PINS and if attack ends succesfully you will get all infos about the attack with the password in clear format! (It accept also only PIN or whetever kind of format except for text before the PIN number)

Example it accept:


```
123456780 hello world what's up?
```

But not accept this:


```
hello world what's up? 123456780
```

![img](https://i.imgur.com/5jTwN3d.png)


# Default WPS PINS of router with local database based on airgeddon
## Default WPS PINS of router with local database based on airgeddon
To proceed with this method you have to leave blank the previous question => "Insert Pin File (DEFAULT Pins in db):".
Warning! Try this at last chance Because Default Router's PIN are few and the attack could fail.

Expand Down

0 comments on commit a18e1e1

Please sign in to comment.