Dr-Lector / reaver-wps

Automatically exported from code.google.com/p/reaver-wps
0 stars 0 forks source link

Got PIN and with -p xxxxxxxx option target sends deauth packer #649

Open GoogleCodeExporter opened 8 years ago

GoogleCodeExporter commented 8 years ago
A few things to consider before submitting an issue:

0. We write documentation for a reason, if you have not read it and are
having problems with Reaver these pages are required reading before
submitting an issue:
http://code.google.com/p/reaver-wps/wiki/HintsAndTips
http://code.google.com/p/reaver-wps/wiki/README
http://code.google.com/p/reaver-wps/wiki/FAQ
http://code.google.com/p/reaver-wps/wiki/SupportedWirelessDrivers
1. Reaver will only work if your card is in monitor mode.  If you do not
know what monitor mode is then you should learn more about 802.11 hacking
in linux before using Reaver.
2. Using Reaver against access points you do not own or have permission to
attack is illegal.  If you cannot answer basic questions (i.e. model
number, distance away, etc) about the device you are attacking then do not
post your issue here.  We will not help you break the law.
3. Please look through issues that have already been posted and make sure
your question has not already been asked here: http://code.google.com/p
/reaver-wps/issues/list
4. Often times we need packet captures of mon0 while Reaver is running to
troubleshoot the issue (tcpdump -i mon0 -s0 -w broken_reaver.pcap).  Issue
reports with pcap files attached will receive more serious consideration.

Answer the following questions for every issue submitted:

0. What version of Reaver are you using?  (Only defects against the latest
version will be considered.)

1. What operating system are you using (Linux is the only supported OS)?
Kali
2. Is your wireless card in monitor mode (yes/no)?
Yes
3. What is the signal strength of the Access Point you are trying to crack?
-46
4. What is the manufacturer and model # of the device you are trying to
crack?
Netgear
5. What is the entire command line string you are supplying to reaver?
reaver -i wlan0 -c 7 -p 10876671 -A -b XX:XX:XX:XX:XX:XX -vv 
--mac=00:11:22:33:44:55 #NETWORK
aireplay-ng wlan0 -1 5 -a XX:XX:XX:XX:XX:XX -e NETWORK -h 00:11:22:33:44:55

6. Please describe what you think the issue is.
I was able to got WPS pin. After running reaver with this pin (-p XXXXXXXX) 
aireplay shows that target sends deauth packets.
7. Paste the output from Reaver below.
REAVER OUTPUT:
[+] Switching wlan0 to channel 7
[+] Waiting for beacon from XX:XX:XX:XX:XX:XX
[+] Associated with XX:XX:XX:XX:XX:XX (ESSID: NETWORK)
[+] Trying pin 10876671
[+] Sending EAPOL START request
[+] Received identity request
[+] Sending identity response
[+] Received identity request
[+] Sending identity response
[+] Received identity request
[+] Sending identity response
[+] Received identity request
[+] Sending identity response
[+] Received identity request
[+] Sending identity response
[+] Received identity request
[+] Sending identity response
[+] Received identity request
[+] Sending identity response
[+] Received M1 message
[+] Sending M2 message
[+] Received M1 message
[+] Sending WSC NACK
[+] Sending WSC NACK
[!] WPS transaction failed (code: 0x03), re-trying last pin
[+] Trying pin 10876671
[+] Sending EAPOL START request
[+] Received M1 message
[+] Sending WSC NACK
[+] Sending WSC NACK
[!] WPS transaction failed (code: 0x03), re-trying last pin
[+] Trying pin 10876671
[+] Sending EAPOL START request
[+] Received M1 message
[+] Sending WSC NACK
[+] Sending WSC NACK
[!] WPS transaction failed (code: 0x03), re-trying last pin
[+] Trying pin 10876671
[+] Sending EAPOL START request
[+] Received identity request
[+] Sending identity response
[+] Received identity request
[+] Sending identity response
[+] Received identity request
[+] Sending identity response
[+] Received identity request
[+] Sending identity response
[+] Received identity request
[+] Sending identity response
[+] Received identity request
[+] Sending identity response
[+] Received M3 message
[+] Sending WSC NACK
[+] Sending WSC NACK
[!] WPS transaction failed (code: 0x03), re-trying last pin
[+] Trying pin 10876671
[+] Sending EAPOL START request
[+] Received M3 message
[+] Sending WSC NACK
[+] Sending WSC NACK
[!] WPS transaction failed (code: 0x03), re-trying last pin
[+] Trying pin 10876671
[+] Sending EAPOL START request
[!] WARNING: Receive timeout occurred
[+] Sending EAPOL START request
[+] Received identity request
[+] Sending identity response
[+] Received identity request
[+] Sending identity response
[+] Received identity request
[+] Sending identity response
[+] Received identity request
[+] Sending identity response
[+] Received identity request
[+] Sending identity response
[+] Received identity request
[+] Sending identity response
[+] Received identity request
[+] Sending identity response
[!] WARNING: Receive timeout occurred
[+] Sending WSC NACK
[!] WPS transaction failed (code: 0x02), re-trying last pin

AIREPLAY OTPUT:
02:05:34  Sending Authentication Request (Open System) [ACK]
02:05:34  Authentication successful
02:05:34  Sending Association Request [ACK]
02:05:34  Association successful :-) (AID: 1)

02:05:34  Got a deauthentication packet! (Waiting 3 seconds)

02:05:37  Sending Authentication Request (Open System) [ACK]
02:05:37  Authentication successful
02:05:37  Sending Association Request [ACK]
02:05:37  Association successful :-) (AID: 1)

02:05:42  Sending Authentication Request (Open System) [ACK]
02:05:42  Authentication successful
02:05:42  Sending Association Request [ACK]
02:05:42  Association successful :-) (AID: 1)

02:05:43  Got a deauthentication packet! (Waiting 3 seconds)

02:05:46  Sending Authentication Request (Open System) [ACK]
02:05:46  Authentication successful
02:05:46  Sending Association Request [ACK]
02:05:46  Association successful :-) (AID: 1)

02:05:51  Sending Authentication Request (Open System) [ACK]
02:05:51  Authentication successful
02:05:51  Sending Association Request [ACK]
02:05:51  Association successful :-) (AID: 1)

02:05:51  Got a deauthentication packet! (Waiting 3 seconds)

02:05:54  Sending Authentication Request (Open System) [ACK]
02:05:54  Authentication successful
02:05:54  Sending Association Request [ACK]
02:05:57  Association successful :-) (AID: 1)

02:06:02  Sending Authentication Request (Open System) [ACK]
02:06:02  Authentication successful
02:06:02  Sending Association Request [ACK]
02:06:02  Association successful :-) (AID: 1)

02:06:02  Got a deauthentication packet! (Waiting 3 seconds)

Original issue reported on code.google.com by exbarbos...@tut.by on 2 Jul 2014 at 6:23