mrod23 / reaver-wps

Automatically exported from code.google.com/p/reaver-wps
0 stars 0 forks source link

Stucks after getting beacon #605

Open GoogleCodeExporter opened 8 years ago

GoogleCodeExporter commented 8 years ago
A few things to consider before submitting an issue:

0. We write documentation for a reason, if you have not read it and are
having problems with Reaver these pages are required reading before
submitting an issue:
http://code.google.com/p/reaver-wps/wiki/HintsAndTips
http://code.google.com/p/reaver-wps/wiki/README
http://code.google.com/p/reaver-wps/wiki/FAQ
http://code.google.com/p/reaver-wps/wiki/SupportedWirelessDrivers
1. Reaver will only work if your card is in monitor mode.  If you do not
know what monitor mode is then you should learn more about 802.11 hacking
in linux before using Reaver.
2. Using Reaver against access points you do not own or have permission to
attack is illegal.  If you cannot answer basic questions (i.e. model
number, distance away, etc) about the device you are attacking then do not
post your issue here.  We will not help you break the law.
3. Please look through issues that have already been posted and make sure
your question has not already been asked here: http://code.google.com/p
/reaver-wps/issues/list
4. Often times we need packet captures of mon0 while Reaver is running to
troubleshoot the issue (tcpdump -i mon0 -s0 -w broken_reaver.pcap).  Issue
reports with pcap files attached will receive more serious consideration.

Answer the following questions for every issue submitted:

0. What version of Reaver are you using?  (Only defects against the latest

version will be considered.)
 v1.3 also tried with v1.4 at first.

1. What operating system are you using (Linux is the only supported OS)?

 ubuntu 13.10, 64 bit

2. Is your wireless card in monitor mode (yes/no)?

 yes, I am doing that with airmon-ng start wlan0

 its output is : ....

 Interface  Chipset     Driver

 wlan0      Unknown     iwlwifi - [phy0]
                (monitor mode enabled on mon0)

3. What is the signal strength of the Access Point you are trying to crack?

 PWR= -59

4. What is the manufacturer and model # of the device you are trying to
crack?

 airties_rt-212

5. What is the entire command line string you are supplying to reaver?

 reaver -i mon0 -c 6 -b 00:1C:A8:D3:89:72 -vv

 and also tried 

 reaver -i mon0 -c 6 -b 00:1C:A8:D3:89:72 -vv -L -d 0

 but the output is same. 

6. Please describe what you think the issue is.

 no idea

7. Paste the output from Reaver below.

 [+] Waiting for beacon from 00:1C:A8:D3:89:72
 [+] Associated with 00:1C:A8:D3:89:72 (ESSID: AIRTIES_RT-212)

Original issue reported on code.google.com by taratata...@gmail.com on 9 Jan 2014 at 4:19