Closed GoogleCodeExporter closed 9 years ago
Actually, a simple option to re-associate after perceived rate limiting would
do the trick (if Reaver is actually re-associating).
Original comment by philippe...@hotmail.com
on 4 Jan 2012 at 8:08
This is easily fixed using --ignore-locks. I am very sorry, I had read the
ReadMe on the wiki, not the actual Reaver help. Using ignore locks, the tool
displays timeout warnings for about 60seconds and then cracks 4 new pins every
time.
Please close this issue,
Great work BTW!
Original comment by philippe...@hotmail.com
on 4 Jan 2012 at 8:22
Thanks philippe! There is a bug in Reaver 1.3 that prevents Reaver from
properly identifying when an AP has unlocked WPS. This has been fixed in the
SVN code, so you should be able to properly specify a 60 second wait period and
Reaver will start the attack after 60 seconds.
Original comment by cheff...@tacnetsol.com
on 4 Jan 2012 at 12:51
Thank you! r58 properly identifies my AP has unlocked (setting a 60 seconds
lock-delay). I wish my RT73 device was 5GHz compatible, now :) Keep up the good
work!
Original comment by philippe...@hotmail.com
on 4 Jan 2012 at 8:43
Original issue reported on code.google.com by
philippe...@hotmail.com
on 4 Jan 2012 at 8:01