Rottsap / reaver-wps

Automatically exported from code.google.com/p/reaver-wps
0 stars 0 forks source link

WPS transaction failed (code: 0x04), re-trying last pin #434

Open GoogleCodeExporter opened 8 years ago

GoogleCodeExporter commented 8 years ago
A few things to consider before submitting an issue:

0. We write documentation for a reason, if you have not read it and are
having problems with Reaver these pages are required reading before
submitting an issue:
http://code.google.com/p/reaver-wps/wiki/HintsAndTips
http://code.google.com/p/reaver-wps/wiki/README
http://code.google.com/p/reaver-wps/wiki/FAQ
http://code.google.com/p/reaver-wps/wiki/SupportedWirelessDrivers
1. Reaver will only work if your card is in monitor mode.  If you do not
know what monitor mode is then you should learn more about 802.11 hacking
in linux before using Reaver.
2. Using Reaver against access points you do not own or have permission to
attack is illegal.  If you cannot answer basic questions (i.e. model
number, distance away, etc) about the device you are attacking then do not
post your issue here.  We will not help you break the law.
3. Please look through issues that have already been posted and make sure
your question has not already been asked here: http://code.google.com/p
/reaver-wps/issues/list
4. Often times we need packet captures of mon0 while Reaver is running to
troubleshoot the issue (tcpdump -i mon0 -s0 -w broken_reaver.pcap).  Issue
reports with pcap files attached will receive more serious consideration.

Answer the following questions for every issue submitted:

0. What version of Reaver are you using?  (Only defects against the latest
version will be considered.)

1. What operating system are you using (Linux is the only supported OS)?

BackTrack 5 R3  running on VirtualBox 4.2.1

2. Is your wireless card in monitor mode (yes/no)?

Yes

3. What is the signal strength of the Access Point you are trying to crack?

-77

4. What is the manufacturer and model # of the device you are trying to
crack?

Telekom Speedport W503V

5. What is the entire command line string you are supplying to reaver?

reaver -i mon0 -b 88:25:2C:77:64:76  -vv -c6 -n --win7 -d5

6. Please describe what you think the issue is.

7. Paste the output from Reaver below.

WPS transaction failed (code: 0x04), re-trying last pin
[+] Trying pin 12345670
[+] Sending EAPOL START request
[!] WARNING: Receive timeout occurred
[+] Sending EAPOL START request
[+] Received identity request
[+] Sending identity response
[+] Received M1 message
[+] Sending M2 message
[+] Received WSC NACK
[+] Sending WSC NACK
[!] WPS transaction failed (code: 0x04), re-trying last pin
[+] Trying pin 12345670
[+] Sending EAPOL START request
[+] Received identity request
[+] Sending identity response
[+] Received M1 message
[+] Sending M2 message
[+] Received WSC NACK
[+] Sending WSC NACK
[!] WPS transaction failed (code: 0x04), re-trying last pin

...

Original issue reported on code.google.com by zyklonba...@googlemail.com on 11 Nov 2012 at 11:22

GoogleCodeExporter commented 8 years ago
Reaver 1.4

Original comment by zyklonba...@googlemail.com on 11 Nov 2012 at 11:23

GoogleCodeExporter commented 8 years ago
This router is not crackable with reaver.
Yes, it appears in wash but can't be cracked with this software.
This is because by default it's Push Button method (WPS-PBC) which reaver can't 
crack.

Original comment by xFxIxC...@gmail.com on 12 Nov 2012 at 2:24

GoogleCodeExporter commented 8 years ago
"Yes, it appears in wash but can't be cracked with this software."
Is there any software which can be used in this case?

Original comment by trancemi...@gmail.com on 18 Feb 2013 at 9:15