Paramat770 / reaver-wps

Automatically exported from code.google.com/p/reaver-wps
0 stars 0 forks source link

Complete range of eight digit wps coverage #332

Open GoogleCodeExporter opened 8 years ago

GoogleCodeExporter commented 8 years ago
A few things to consider before submitting an issue:

0. We write documentation for a reason, if you have not read it and are
having problems with Reaver these pages are required reading before
submitting an issue:
http://code.google.com/p/reaver-wps/wiki/HintsAndTips
http://code.google.com/p/reaver-wps/wiki/README
http://code.google.com/p/reaver-wps/wiki/FAQ
http://code.google.com/p/reaver-wps/wiki/SupportedWirelessDrivers
1. Reaver will only work if your card is in monitor mode.  If you do not
know what monitor mode is then you should learn more about 802.11 hacking
in linux before using Reaver.
2. Using Reaver against access points you do not own or have permission to
attack is illegal.  If you cannot answer basic questions (i.e. model
number, distance away, etc) about the device you are attacking then do not
post your issue here.  We will not help you break the law.
3. Please look through issues that have already been posted and make sure
your question has not already been asked here: http://code.google.com/p
/reaver-wps/issues/list
4. Often times we need packet captures of mon0 while Reaver is running to
troubleshoot the issue (tcpdump -i mon0 -s0 -w broken_reaver.pcap).  Issue
reports with pcap files attached will receive more serious consideration.

Answer the following questions for every issue submitted:

0. What version of Reaver are you using?  (Only defects against the latest
version will be considered.)
A. version 1.4

1. What operating system are you using (Linux is the only supported OS)?
A.BackTrack 5R1

2. Is your wireless card in monitor mode (yes/no)?
A. Yes

3. What is the signal strength of the Access Point you are trying to crack?
A.73%

4. What is the manufacturer and model # of the device you are trying to
crack?
A. N.A

5. What is the entire command line string you are supplying to reaver?
A. reaver -i mon0 -b xx:xx:xx:xx:xx:xx -vv

6. Please describe what you think the issue is.
A. To find the vulnerability of my router I used reaver 1.4 to crack/find the 
wps pin.After 5 hours and progress of 97% The pin and the paraphrase was 
detected correctly.The wps pin was 42929024
My question is that if the pin was 98929024 or some number in 9xxxxxxx, would 
reaver find it in the remaining 3% ?

7. Paste the output from Reaver below.

Original issue reported on code.google.com by darrylca...@gmail.com on 14 Jun 2012 at 3:20

GoogleCodeExporter commented 8 years ago
no.

When Reaver gets the first part of the PIN it automatically get to 90% complete.
You probably missed it, but just before reaver found the first part of your pin 
it was on 42%.
When it found the fist part it went to 90% as there were only 999 tries left to 
determine the rest of the PIN.

btw, can you pleas tell me the model of your AP and the first part of its MAC 
address. 
I am creating a reference DB for predicting the PIN based on the model of the 
AP and its MAC address.

Original comment by BHT...@gmail.com on 17 Jun 2012 at 4:11

GoogleCodeExporter commented 8 years ago
Its a Belkin router and the first part of its MAC address is 94:44:52.I cannot 
tell you the exact model as the router was purchased second hand and the 
sticker is damaged.
Any place to find after login in the router GUI page from the left hand side 
menu?

Original comment by darrylca...@gmail.com on 21 Jun 2012 at 10:20