jbond42 / reaver-wps

Automatically exported from code.google.com/p/reaver-wps
0 stars 0 forks source link

Going very slowly while bruteforcing for last 4 digits. #624

Open GoogleCodeExporter opened 9 years ago

GoogleCodeExporter commented 9 years ago
Hi Fellas,

Not sure if this has been answered before. Couldn't fetch it on google though.

I'm a begginer both in linux kali and reaver. I have downloaded the latest kali 
version and sent the image to my flashdrive. Now everytime I reboot everything 
is fresh (nothing is saved on the flashdrive).
After booting, I'll connect to my network, apt-get update and apt-get install 
reaver, disconnect, start monitoring mode mon0 on my wlan0, and then use reaver.

Then I'll use:
reaver -i mon0 -b my:mac:id -vv -p XXXX
The signal is strong, it's a Belkin.
As you can see, I already know the first 4 numbers because of previous attemps 
on other boots (I made something wrong and my wlan0 stop working at all, so I 
rebooted, but at that point I already had the first 4 digits).
The problem is now, after have found the first 4 digits, everything is going 
VERY SLOWLY: it gets stuck in a single PIN before proceeding. The first half 
brute force went ok, with only a few error now and then (normal).

This is what I get on the second half, mostly:
[+] Trying pin XXXXYZMK
[+] Sending EAPOL START request
[+] Received identity request
[+] Sending identity response
[!] WARNING: Receive timeout occurred
[+] Sending WSC NACK
[!] WPS transaction failed (code: 0x02), re-trying last pin

And it repeats alot until going to the next PIN, getting sometimes the WARNING 
10 failed connections error, and sometimes 0x03.
I'm on 93% now, but will take a lot of hours to finish is the correct PIN is on 
the last 1 or 0.5%

I have tried -S,
-f
-d 0
-d 30:30 (don't think this is right)
-S -d 0
-S -d 0 -f

PS: I have already successfully cracked a password from another router of 
mine(other brand) previously, and everything went alright. The only difference 
is that at this time I wasn't apt-get update/install reaver on boot.

PS2: This is a different issue, but with this version of kali i'm using is it 
possible to find the saved sessions of reaver? Cause they ain't where they're 
supposed to be ~/usr/local/etc/reaver/

Thanks a lot!

Original issue reported on code.google.com by gverri...@gmail.com on 13 Mar 2014 at 6:39

GoogleCodeExporter commented 9 years ago
avoid use -p, this makes mess the file .wpc in /usr/local/etc/reaver/
you can save session in other place with -s /media/flashusb/session.wpc
so try again with:
reaver -i mon0 -b <mac> -a -S -c 11 -vv -s /media/flashusb/session.wpc
to enter with the first 4 digits, first let save the session with 1%, at this 
point cancel and go edit session.wpc and change first line yours 4 digits. Save 
.wpc and run reaver again. you'll jump %

Original comment by deltomaf...@gmail.com on 15 Mar 2014 at 1:19

GoogleCodeExporter commented 9 years ago
Hi I need help here. I am stuck in timeout occurred after I did a reaver 
command. I use vmware non commercial and backtrack 5 r3, and tplink wn722n 
atheros chipset. Though I use a compatible wireless adapter it seems that for 
some reason it is still not able to push thru. This is my first try cracking 
wifi, but I've tried it many times with different ways. I already use the 
aircrack-ng not able to get key, then now I am trying this reaver and it's not 
doing what it suppose to be. Need your help people here.

Original comment by markferd...@gmail.com on 19 Jul 2015 at 3:58

GoogleCodeExporter commented 9 years ago
Hi I need help here. I am stuck in timeout occurred after I did a reaver 
command. I use vmware non commercial and backtrack 5 r3, and tplink wn722n 
atheros chipset. Though I use a compatible wireless adapter it seems that for 
some reason it is still not able to push thru. This is my first try cracking 
wifi, but I've tried it many times with different ways. I already use the 
aircrack-ng not able to get key, then now I am trying this reaver and it's not 
doing what it suppose to be. Need your help people here.

Original comment by markferd...@gmail.com on 19 Jul 2015 at 3:58