The person discovering the Pixie Dust Attack noted that only a few lines of code in reaver could be added to implement this attack.
Prior to the discovery of Pixie Dust Musket Teams came across this Reaver Abberation which seems to deal with default keys. The approach is involved requiring the reader to follow certain steps.
Those finding targets that run up to 99.99 and spin endlessly should try the steps outlined and see if the WPS and WPA key is obtained.
We wish to add here that the last part of the attack wherein you start the attack again might need to be done right after the router is rebooted. So try a few times - and.or try and reset the router with mdk3 before you abandon this apporach
We have duplicated this attack on two(2) different routers so this is NOT just a one off event
Read the following
https://forums.kali.org/showthread.php?22507-Cracking-6C-19-8F-D-Link-Router-wit
h-reaver-and-defeating-the-99-99-problem&highlight=reaver
Original issue reported on code.google.com by muskette...@gmail.com on 2 Nov 2014 at 12:34
Original issue reported on code.google.com by
muskette...@gmail.com
on 2 Nov 2014 at 12:34