0. What version of Reaver are you using? (Only defects against the latest
version will be considered.)
Reaver 1.4
1. What operating system are you using (Linux is the only supported OS)?
Backtrack 5R2 default drivers
USB Flash Boot
2. Is your wireless card in monitor mode (yes/no)?
yes.
3. What is the signal strength of the Access Point you are trying to crack?
-40db
4. What is the manufacturer and model # of the device you are trying to
crack?
D-Link DIR-300
5. What is the entire command line string you are supplying to reaver?
reaver -i mon0 -b F0:7D:68:3F:FF:B4 -c 1 -vv
6. Please describe what you think the issue is.
The AP is vulnerable as i have successfully cracked the WPS PIN with Ateros
internal card. That is mine AP with WPS turned on.
I've tried many reaver's command line options, but no success.
Here is list of distributions tested:
BackTrack 5 R2 reaver - no good.
Wifislax 4.2 reaver - no good
Wifislax 4.2 - via minidwep-gtk (i think it's just GUI reaver) - ok, about 3-4
seconds/pin.
I really like Backtrack, how can I use reaver for WPS attack?
My only option is to boot from flash, so I can't install any drivers because I
need to reboot.
And yep, I'm noob in Linux.
7. Paste the output from Reaver below.
[+] Switching mon0 to channel 1
[?] Restore previous session for F0:7D:68:3F:FF:B4? [n/Y] n
[+] Waiting for beacon from F0:7D:68:3F:FF:B4
[!] WARNING: Failed to associate with F0:7D:68:3F:FF:B4 (ESSID: alfa)
[!] WARNING: Failed to associate with F0:7D:68:3F:FF:B4 (ESSID: alfa)
[!] WARNING: Failed to associate with F0:7D:68:3F:FF:B4 (ESSID: alfa)
Original issue reported on code.google.com by 4black...@gmail.com on 13 Aug 2012 at 5:47
Original issue reported on code.google.com by
4black...@gmail.com
on 13 Aug 2012 at 5:47