allishwell / reaver-wps

Automatically exported from code.google.com/p/reaver-wps
0 stars 0 forks source link

Add the ability to start with bruteforce of arbitrary code #185

Open GoogleCodeExporter opened 8 years ago

GoogleCodeExporter commented 8 years ago
Add the ability to start with bruteforce of arbitrary code . In 4 cases out of 
5 on TP-Link routers Pin-code starts with 8XXXXXXX. 

Original issue reported on code.google.com by Alexande...@gmail.com on 26 Jan 2012 at 11:42

GoogleCodeExporter commented 8 years ago
if patterns are found, such as all xxx module routers start pin at "8xxxxxxx" 
then 
a. like above the option to pri-oritise that "thousands" row would be cool 
b. as well a wiki or master thread/chart with routers and known first pin 
numbers patterns. for example all tp-link 123's start with either - 7 or 8- 
netgear module 456 's are known to start with 9's. thereby speeding the process 
by 9-10 times?

Original comment by dnk...@gmail.com on 17 Apr 2012 at 12:41

GoogleCodeExporter commented 8 years ago
you can edit file with filename of your target network bssid in etc/reaver/ 
folder by changing first 4 digit number. just make sure you use administrative 
privileges

Original comment by pozega.t...@gmail.com on 16 May 2012 at 6:38

GoogleCodeExporter commented 8 years ago
Google search brought me here.

I also support this issue.  As a suggestion, a forum could be created (or 
perhaps a FAQ , or something of that nature) where users can post results of 
their research, maybe pin statistics, penetration times, methods that are 
better than others, and other related findings/results.  

Also, while there is a workaround for arbitrarily starting the first four 
numbers of the PIN, I think there are better approaches, especially when one 
could refer to a database.

It is also worth noting that (at least at reaver ver 1.4) the .WPC files are 
located in /usr/local/etc/reaver

Original comment by gra...@gmail.com on 24 Jun 2012 at 4:52