Hi Guys, I have found an approach for cracking TP-Link wpa by using some algorithm in this website http://www.backtrack-linux.org/forums/showthread.php?t=62673 However, I dont understand how it work and how we can dictionary wpa attack. Have anyone tried before or can it improve to a better version? Or does anyone know how to crack TP-Link router, because I tried several times with pixiewps, reaver , bully , minidwep.....still cannot crack it.
The method of pixiewps require particular Ralink chipset, but Dominique said that by analyzing other brand's chipset, actually can extend the usage of pixiewps to other router brand tp://video.adm.ntnu.no/pres/549931214e18d
If pixiewps fails, can you capture a handshake? If so, crunch a .lst of 8 digits and aircrack-ng or pyrit against it and see if that gets you in. Otherwise you can only move on to very advanced measures involving social engineering.