Open GoogleCodeExporter opened 9 years ago
Psychodele select option 3
Original comment by denos.D...@gmail.com
on 22 Aug 2014 at 4:44
You can usually use default settings but you may need to play with it
Original comment by denos.D...@gmail.com
on 22 Aug 2014 at 4:45
revdk3 solved my problem using attack #2. I never tried 3 because 2 seemed to
be working so well.
It spit out all the info when it found the pin (pin, pass, and essid)
I am concearned about revdk3 slowing down the attack. If you are having
similar problems like I was where you can get the pin but its not giving you
the pass it may be quicker to crack the first 4 numbers with just reaver then
use revdk3 for the rest.
Just a thought and thinks for the info denos
Original comment by psychede...@gmail.com
on 22 Aug 2014 at 2:31
Using revdk3 alone took about 19 hours. My issue was the AP locking out and
this script helped in unlocking the Ap after 60 seconds so its a bit longer but
I feel that helps people get further in their attemps then just using reaver.
This script is using reaver and MDK3 which solves issues some issues that
reaver has on its own.
Original comment by denos.D...@gmail.com
on 22 Aug 2014 at 6:54
There is a kool script called frankenscript where it gives default pins on some
routers. Worth a shot if you want pin instantly without bruteforcing.
https://forums.kali.org/showthread.php?22087-Howto-frankenScript&s=10d68384d5a17
1b078255af24dc1f023
Original comment by denos.D...@gmail.com
on 22 Aug 2014 at 7:03
I should say wps generator
Original comment by denos.D...@gmail.com
on 22 Aug 2014 at 7:07
guys , pleaseee help me :(((
i install bully and do commands right !
but i get this ! :
root@Max:~# bully -b xx:xx:xx:xx:xx:xx -c 6 -T mon0
[!] Bully v1.0-22 - WPS vulnerability assessment utility
[+] Switching interface 'mon0' to channel '6'
[!] Using '00:11:22:33:44:55' for the source MAC address
[+] Datalink type set to '127', radiotap headers present
[+] Scanning for beacon from '60:a4:4c:ee:cd:a4' on channel '6'
[!] Excessive (3) FCS failures while reading next packet
[!] Excessive (3) FCS failures while reading next packet
[!] Excessive (3) FCS failures while reading next packet
[!] Disabling FCS validation (assuming --nofcs)
[+] Got beacon for 'milk' (xx:xx:xx:xx:xx:xx)
[X] The AP doesn't appear to be WPS enabled (no WPS IE)
Help me :(
Original comment by pooya.si...@gmail.com
on 29 Sep 2014 at 4:57
[deleted comment]
had same problem, used the bully version 1.0-22:
bully -b e8:94:f6:xx:xx:xx -p 24461924 -B -c 5 mon0 -L
resolved!
did not need to install Reaver 1.3 or wpa_supplicant
Original comment by deltomaf...@gmail.com
on 22 Dec 2014 at 4:53
second Router different manufacturer with the same problem, worked with the
Bully!
Original comment by deltomaf...@gmail.com
on 23 Dec 2014 at 8:04
[deleted comment]
I have problem,
reaver cracked the code and the is it like:
Pin cracked in 34542 seconds
[+] WPS PIN: '05228362'
[+] WPA PSK: 'qBurKPqBmm'
[+] AP SSID: 'ZyXEL'
but wpa psk is not usable, (AP doesnt accept it) and every time when I test
this pin wpa psk is different...
Original comment by gooran...@gmail.com
on 27 Dec 2014 at 8:19
try using TP-LINK QSS Utility if pin's the same every time
Original comment by rmps...@gmail.com
on 27 Dec 2014 at 8:45
I found a solution based on comment #6.What I did was when I put my device into
monitor mode I did not kill the "wpa_supplicant" process and the "network
manager" process. Then I simply just ran the -p argument on reaver and it
retrieved the key for my AP.
Original comment by jgonzale...@yahoo.com
on 2 Jan 2015 at 9:21
hi i have wps pin and use this command in
reaver -i mon0 -b xx:xx:xx:xx:xx:xx -p xxxxxxxx -vv
but every time it show
[!] WPS transaction failed (code: 0x03), re-trying last pin
[+] Trying pin xxxxxxxx
it take 2-3 hour but i didn't got password.
all time same message.
please suggest any solution.
Original comment by jays9711...@gmail.com
on 21 Jan 2015 at 9:07
Original issue reported on code.google.com by
Bel.Mard...@gmail.com
on 30 Jan 2012 at 10:51