

If you're using a public router (airports, libraries, starbucks) and have to get a username password, you're going to have to steal that from someone. Or use THC-Hydra to run a brute force attack. If you want to access the router's control panel (the page) but don't know the password - reset the router then find the default password here. Then you can run a aircrack-ng dictionary attack on the. aireplay will reconnect you to the access point and airodump capture the 4-way handshake as a.

cap file) then use aireplay-ng to deauth with access point. If you need to crack wpa2 password, you can run airodump-ng on the access point (use -w to write a. If it has WPS on it, use reaver (you can use wash -i mon0 to figure out if it is running wps)
