master2be1 / reaver-wps

Automatically exported from code.google.com/p/reaver-wps
0 stars 0 forks source link

Failed to associate #140

Closed GoogleCodeExporter closed 9 years ago

GoogleCodeExporter commented 9 years ago
0. What version of Reaver are you using?  (Only defects against the latest
version will be considered.)

reaver 1.3

1. What operating system are you using (Linux is the only supported OS)?

backtrack 5R1 runing on vmplayer(by using a boot CD I have the same issue)
uname -a 
linux bt 2.6.39.4

2. Is your wireless card in monitor mode (yes/no)?
yes

3. What is the signal strength of the Access Point you are trying to crack?
very strong the AP is next to the wireless card..it is my router
PWR is -26 in airodump output

4. What is the manufacturer and model # of the device you are trying to
crack?

a 2wire 2701HG-G router 

5. What is the entire command line string you are supplying to reaver?

reaver -i mon 0 -b 00:26:50:47:4A:19

6. Please describe what you think the issue is.

Failed to associate error

7. Paste the output from Reaver below.

View image : http://www.picpaste.com/BT5R1-JAeJJKPx.jpg

Original issue reported on code.google.com by voleuse....@gmail.com on 16 Jan 2012 at 5:10

GoogleCodeExporter commented 9 years ago
I assume that you do not have MAC filtering enabled on your AP? You can also 
tell Reaver to skip the association with the -A option and use aireplay-ng to 
associate to the AP.

Original comment by cheff...@tacnetsol.com on 16 Jan 2012 at 5:15

GoogleCodeExporter commented 9 years ago
And have you uses wash before to ensure the AP supports WPS?
Try to update to last revision too, it may fix it.

Original comment by andremeg...@hotmail.com on 16 Jan 2012 at 5:24

GoogleCodeExporter commented 9 years ago
Thank you for responding me.
No there is no MAC filtering. I verified it.
This for the -A option:

root@bt:~/test/reaver-1.3/src# reaver -i mon0 -b 00:26:50:47:4A:19 -A -vv

Reaver v1.3 WiFi Protected Setup Attack Tool
Copyright (c) 2011, Tactical Network Solutions, Craig Heffner 
<cheffner@tacnetsol.com>

reaver: invalid option -- 'A'
Required Arguments:
    -i, --interface=<wlan>          Name of the monitor-mode interface to use
    -b, --bssid=<mac>               BSSID of the target AP

Optional Arguments:
    -m, --mac=<mac>                 MAC of the host system
    -e, --essid=<ssid>              ESSID of the target AP
    -c, --channel=<channel>         Set the 802.11 channel for the interface (implies -f)
    -o, --out-file=<file>           Send output to a log file [stdout]
    -s, --session=<file>            Restore a previous session file
    -a, --auto                      Auto detect the best advanced options for the target AP
    -f, --fixed                     Disable channel hopping
    -5, --5ghz                      Use 5GHz 802.11 channels
    -v, --verbose                   Display non-critical warnings (-vv for more)
    -q, --quiet                     Only display critical messages
    -h, --help                      Show help

Advanced Options:
    -p, --pin=<wps pin>             Use the specified 4 or 8 digit WPS pin
    -d, --delay=<seconds>           Set the delay between pin attempts [1]
    -l, --lock-delay=<seconds>      Set the time to wait if the AP locks WPS pin attempts [315]
    -g, --max-attempts=<num>        Quit after num pin attempts
    -x, --fail-wait=<seconds>       Set the time to sleep after 10 unexpected failures [0]
    -r, --recurring-delay=<x:y>     Sleep for y seconds every x pin attempts
    -t, --timeout=<seconds>         Set the receive timeout period [5]
    -T, --m57-timeout=<seconds>     Set the M5/M7 timeout period [0.20]
    -S, --dh-small                  Use small DH keys to improve crack speed
    -L, --ignore-locks              Ignore locked state reported by the target AP
    -E, --eap-terminate             Terminate each WPS session with an EAP FAIL packet
    -n, --nack                      Target AP always sends a NACK [Auto]
    -w, --win7                      Mimic a Windows 7 registrar [False]

Example:
    reaver -i mon0 -b 00:90:4C:C1:AC:21 -vv

root@bt:~/test/reaver-1.3/src# reaver -i mon0 -b 00:26:50:47:4A:19 -a -vv

Reaver v1.3 WiFi Protected Setup Attack Tool
Copyright (c) 2011, Tactical Network Solutions, Craig Heffner 
<cheffner@tacnetsol.com>

[+] Waiting for beacon from 00:26:50:47:4A:19
[+] Switching mon0 to channel 2
[!] WARNING: Failed to associate with 00:26:50:47:4A:19 (ESSID: BELL999)
^C
[+] Nothing done, nothing to save.
[+] Session saved.
root@bt:~/test/reaver-1.3/src# 

---Sorry but what is the wash command ? and where can i download the last 
revision since i downloaded the last reaver 1.3 from this site ?

Original comment by voleuse....@gmail.com on 16 Jan 2012 at 2:41

GoogleCodeExporter commented 9 years ago
Ah, there's your problem. :)

The -A option was not included until after version 1.3. You'll have to check 
out the latest SVN code (instructions here: 
http://code.google.com/p/reaver-wps/source/checkout).

Original comment by cheff...@tacnetsol.com on 16 Jan 2012 at 2:44

GoogleCodeExporter commented 9 years ago
i ve done the walsh command. it seems working and trying pins.

but why it is not working on my AP ? and where can i find the last revision.

i want to help for tests for this project.i find it very nice.

Original comment by voleuse....@gmail.com on 16 Jan 2012 at 3:29

GoogleCodeExporter commented 9 years ago
Enter in the command line:

svn checkout http://reaver-wps.googlecode.com/svn/trunk/ reaverlatest

reaverlatest will be a new folder containing latest revision
then goto into this directory change into src

./configure
make
make install

Original comment by patricks...@gmail.com on 16 Jan 2012 at 3:39

GoogleCodeExporter commented 9 years ago
thank you very much.

now i am trying reaver 1.4.

this defect should be close.

i ll get beack to you.

Original comment by voleuse....@gmail.com on 16 Jan 2012 at 7:36

GoogleCodeExporter commented 9 years ago

Original comment by cheff...@tacnetsol.com on 17 Jan 2012 at 1:18