h-eibot / reaver-wps

Automatically exported from code.google.com/p/reaver-wps
0 stars 0 forks source link

backtrack 5 r3 with reaver 1.4 result need help #397

Open GoogleCodeExporter opened 8 years ago

GoogleCodeExporter commented 8 years ago

Answer the following questions for every issue submitted:

0. What version of Reaver are you using?
reaver 1.4

1. What operating system are you using (Linux is the only supported OS)?
backtrack 5 rv3

2. Is your wireless card in monitor mode (yes/no)?
yes

3. What is the signal strength of the Access Point you are trying to crack?
-60 base on wash

4. What is the manufacturer and model # of the device you are trying to
crack?

5. What is the entire command line string you are supplying to reaver?
  reaver -i mon0 -c 6 -b 00:23:69:C3:C2:C9 -vv

6. Please describe what you think the issue is.

7. Paste the output from Reaver below.

!] WARNING: Receive timeout occurred
[+] Sending WSC NACK
[!] WPS transaction failed (code: 0x02), re-trying last pin
[+] Trying pin 12345670
[+] Sending EAPOL START request
[+] Received identity request
[+] Sending identity response
[+] Received M1 message
[+] Sending M2 message
[+] Sending WSC NACK
[!] WPS transaction failed (code: 0x03), re-trying last pin
[!] WARNING: 10 failed connections in a row
[+] Trying pin 12345670
[+] Sending EAPOL START request
[+] Received identity request
[+] Sending identity response
[+] Received M1 message
[+] Sending M2 message
[+] Sending WSC NACK
[!] WPS transaction failed (code: 0x03), re-trying last pin
[+] Nothing done, nothing to save.
[+] 0.00% complete @ 2012-09-08 20:34:00 (0 seconds/pin)
[+] Trying pin 12345670
[+] Sending EAPOL START request
[+] Received identity request
[+] Sending identity response
[+] Received M1 message
[+] Sending M2 message
[+] Received WSC NACK
[+] Sending WSC NACK
[!] WPS transaction failed (code: 0x04), re-trying last pin
[+] Trying pin 12345670
[+] Sending EAPOL START request
[+] Received identity request
[+] Sending identity response
[+] Received M1 message
[+] Sending M2 message
[+] Received WSC NACK
[+] Sending WSC NACK
[!] WPS transaction failed (code: 0x04), re-trying last pin
[+] Trying pin 12345670
[+] Sending EAPOL START request
[+] Received identity request
[+] Sending identity response
[+] Received M1 message
[+] Sending M2 message
[+] Sending WSC NACK
[!] WPS transaction failed (code: 0x03), re-trying last pin
[+] Trying pin 12345670
[+] Sending EAPOL START request
[!] WARNING: Receive timeout occurred
[+] Sending EAPOL START request
[+] Received identity request
[+] Sending identity response
[!] WARNING: Receive timeout occurred
[+] Sending WSC NACK
[!] WPS transaction failed (code: 0x02), re-trying last pin
[+] Trying pin 12345670
[+] Sending EAPOL START request
[!] WARNING: Receive timeout occurred
[+] Sending EAPOL START request
[!] WARNING: Receive timeout occurred
[+] Sending EAPOL START request
[+] Received identity request
[+] Sending identity response
[+] Received M1 message
[+] Sending M2 message
[+] Received WSC NACK
[+] Sending WSC NACK
[!] WPS transaction failed (code: 0x04), re-trying last pin
[+] Nothing done, nothing to save.
[+] 0.00% complete @ 2012-09-08 20:34:55 (0 seconds/pin)
^C
[+] Nothing done, nothing to save.
root@bt:~# wah
wah: command not found
root@bt:~# wash

Wash v1.4 WiFi Protected Setup Scan Tool
Copyright (c) 2011, Tactical Network Solutions, Craig Heffner 
<cheffner@tacnetsol.com>

Required Arguments:
        -i, --interface=<iface>              Interface to capture packets on
        -f, --file [FILE1 FILE2 FILE3 ...]   Read packets from capture files

Optional Arguments:
        -c, --channel=<num>                  Channel to listen on [auto]
        -o, --out-file=<file>                Write data to file
        -n, --probes=<num>                   Maximum number of probes to send to each AP in scan mode [15]
        -D, --daemonize                      Daemonize wash
        -C, --ignore-fcs                     Ignore frame checksum errors
        -5, --5ghz                           Use 5GHz 802.11 channels
        -s, --scan                           Use scan mode
        -u, --survey                         Use survey mode [default]
        -h, --help                           Show help

Example:
        wash -i mon0

root@bt:~# reaver -i mon0 -f -c 6 -b 00:25:9C:DC:9A:6F -vv

Original issue reported on code.google.com by highclif...@gmail.com on 11 Sep 2012 at 11:19

GoogleCodeExporter commented 8 years ago
Hi,
signal low,but i found pass with signal -63 or ctrl+c and repeat again,
It help me.
brgds

Original comment by karpe...@gmail.com on 13 Sep 2012 at 1:30

GoogleCodeExporter commented 8 years ago
use -w

Original comment by sambas...@gmail.com on 24 Sep 2012 at 2:38

GoogleCodeExporter commented 8 years ago
[deleted comment]
GoogleCodeExporter commented 8 years ago
Hi guys I'am trying to crack wpa2 with reaver 1.4 using linux ,and my wireless 
card is on monitor mode ,the signal strength of the Access point is good 
the entire command line string which i'am suplyying to reaver is :
reaver i- mon0 -b (bssid) -vv
I think the problem is in the dictionnary cuz i don't have it
Please help me

Original comment by Omaradh...@gmail.com on 10 May 2013 at 3:50