heppona / auto-reaver

Automatically exported from code.google.com/p/auto-reaver
0 stars 0 forks source link

NETGEAR WGR614v10 Firmware Version 1.0.2.58 - 1.0.2.60 #1

Open GoogleCodeExporter opened 8 years ago

GoogleCodeExporter commented 8 years ago
What steps will reproduce the problem?
1. Patch notes on new Netgear firmware versions 1.0.2.58 - 1.0.2.60 lists that 
the exploit has been fixed and patched. all reaver does now is when tires a pin 
it would be in a loop WPS transaction failed 0x02 code all while the AP is not 
locked (checked with wash -i mon0)
2. I am not sure if this is a problem but Reaver does not detect the device as 
patched or invulnerable to the attack
3. Just means Reaver 1.4 is outdated and has been patched or no longer useful

What is the expected output? What do you see instead?
This router was very easy to crack before the firmware update and now it is 
impossible with reaver.

What version of the product are you using? On what operating system?
reaver 1.4 recent one. tried with kali and bt5r3 same outcome

Please provide any additional information below.
Is there any plans for new version of reaver capable to detect fixed ap's and 
or incorporate some kind of workaround for the fixes made to the firmware of 
the routers? 

Original issue reported on code.google.com by berezini...@gmail.com on 16 Dec 2014 at 10:06

GoogleCodeExporter commented 8 years ago
Sorry I'm not a Reaver-WPS developer, you need to post this on Reaver-WPS 
project page.

Original comment by dominik....@gmail.com on 5 Feb 2015 at 8:26