Open GoogleCodeExporter opened 9 years ago
other APs with WPS off state but it's simple to check.
run wireshark on mon0 and set as filter "wps.wifi_protected_setup_state == 0x02
&& wlan_mgt.tag.number==5" (without qoutes), tnan look to SSID names, must be 2
APs like in wash
Original comment by lulzse...@gmail.com
on 7 Feb 2012 at 11:38
In addition to "lulzse...@gmail.com" answer, you can also try wpscan and wpspy
tools from SourceSec. (I'm not part of it, I'm just someone who stumbled on the
tools and thought I should share)
download link: http://www.sourcesec.com/Lab/wps_tools.tar.gz
info: http://www.sourcesec.com/2009/05/09/wpscan-wpspy-tools/
Original comment by miguelfa...@gmail.com
on 8 Feb 2012 at 12:38
I've found that my access point tp-link WA801ND wasn't shown by wash
anyhow reaver successfully attack it and obtain the WPA preshared-key.
Original comment by stir...@gmail.com
on 8 Feb 2012 at 10:46
The WA801ND does not appear to have WPS. Instead I believe it uses QSS or
Quick Secure Setup. I am going to guess this is the same sort of thing as SES
(SecureEasySetup https://en.wikipedia.org/wiki/SecureEasySetup) which is on all
three of my linksys devices and as such is not WPS compliant or vulnerable to
the WPS attack.
Original comment by BobPlon...@googlemail.com
on 19 Jun 2012 at 8:14
Original issue reported on code.google.com by
muzha.ar...@gmail.com
on 7 Feb 2012 at 11:06