How to decode WPA/WEP keys using Penetrate Pro

How to decode WPA/WEP keys using Penetrate Pro

The App Penetrate Pro is developed by Biogo Ferreria. It is an excellent App for decoding WEP/WPA WiFi Keys.
The Latest Build of the penetrate pro supports the following features.
  • Routers based on Thomson: Thomson, Infinitum, BBox, DMax, Orange, SpeedTouch, BigPond, O2Wireless, Otenet.
  • DLink
  • Eircom
  • Pirelli Discus
  • Verizon FiOS (only some routers)
  • Fastweb (Pirelli & Telsey)
  • Jazztel_XXXX and WLAN_XXXX
  • Tecom
  • Infostrada
  • SkyV1
Disclaimer – Our tutorials are designed to aid aspiring pen testers/security enthusiasts in learning new skills, we only recommend that you test this tutorial on a system that belongs to YOU. We do not accept responsibility for anyone who thinks it’s a good idea to try to use this to attempt to hack systems that do not belong to you.

Requirements

Minimum of Android 2.4

How to use it

  1. Download the Penetrate Pro form this LINK
  2. Install it in your android device (Your Android Device must be rooted)
  3. When you open it you will see a window
penetrate pro
If it says “Reversible: 0 found”, you have to change the target.
Reversing the Thomson routers requires a dictionary file or you can use 3G for it.
Once you got a reversible router, you can tap on it to get the WiFi Keys (Don’t forget to enable “Get keys from the web” by going to the settings):
Penetrate Pro how to
You can copy the keys just by simply tapping on them.
Penetrate pro also has a “Manual Search” option that allows users to find keys for a particular router which is not in the main list.
 

How To Use Manual Search Option

 
1. First, select the “Manual search” option from the menu.
 
manual search
2. Select the router:
manual search 1
3. Enter the numbers at the end of the network name. Then tap on “search”.
manual search 2
4. It will display the key(s):
manual search 3
Of course, Penetrate Pro is not a sophisticated tool like Aircrack android, but it is clearly a useful tool for penetration testers.
 
Take your time to comment on this article.

Comments