What steps will reproduce the problem?
1. Patch notes on new Netgear firmware versions 1.0.2.58 - 1.0.2.60 lists that
the exploit has been fixed and patched. all reaver does now is when tires a pin
it would be in a loop WPS transaction failed 0x02 code all while the AP is not
locked (checked with wash -i mon0)
2. I am not sure if this is a problem but Reaver does not detect the device as
patched or invulnerable to the attack
3. Just means Reaver 1.4 is outdated and has been patched or no longer useful
What is the expected output? What do you see instead?
This router was very easy to crack before the firmware update and now it is
impossible with reaver.
What version of the product are you using? On what operating system?
reaver 1.4 recent one. tried with kali and bt5r3 same outcome
Please provide any additional information below.
Is there any plans for new version of reaver capable to detect fixed ap's and
or incorporate some kind of workaround for the fixes made to the firmware of
the routers?
Original issue reported on code.google.com by berezini...@gmail.com on 16 Dec 2014 at 10:06
Original issue reported on code.google.com by
berezini...@gmail.com
on 16 Dec 2014 at 10:06