parkc016 / reaver-wps

Automatically exported from code.google.com/p/reaver-wps
0 stars 0 forks source link

AP router disappeared from wash list after 3 attempts and received "detected ap rate limiting waiting 60 seconds before re-checking #534

Open GoogleCodeExporter opened 8 years ago

GoogleCodeExporter commented 8 years ago
I had two Arris routers available in wash with lock status as NO initially. I 
tried the basic command of reaver to do them, and after 3 attempts, it kept on 
showing "detected ap rate limiting waiting 60 seconds before re-checking". I 
stopped the attack and when I try to resume it, I couldn't even accociate with 
them, accosiate fail message and timeout message kept on showing. I checked 
wash list, they both disappeared from the wash list. I don't know if my initial 
attack was discovered by their security software and they turned off the WPS 
feature or the two routers turned off the WPS by temselves due to my attack. 
Later I got familiar with reaver and tried to play with those arguements but 
none of them were working, which showed their WPS seemed already turned off 
permanently for sure.

So what should I do?

I have some plans in mind.

1. Try to force these APs to reboot or reset, either by crash them via DDos or 
anything else that will bring the similar results and then they will reboot or 
reset by themselves or their holders will find their network are not working so 
manually reset their routers. So by that I can use reaver again, but yet the 
new problem is how to prevent they lock the WPS again.

2. I also tried the aircrack, but since their default passwords are up to 16 
chacacters with combination of numbers and letters, the dictionary would be 
extremely large. So after a try, I gave up.

3. As I know I can somehow use the MAC address or the manufactuer of the router 
to search for their default PIN and WEP online(I believe they are still 
defalut).

4. I don't know if I can log in to the routers' gateway page (192.168.100.1) 
without actually successfully connected to the router(I mean just type a random 
password when I try to connect them and it will still show the status as 
"connected" in my connection panel). (And again, I still believe that username 
and password are still default, which are admin and 1234).

Above are all the ways I can think of, could you please give me some 
suggestions or how did you successfully crack those self-locked-permanently 
routers?

Many many thanks for your help in advance.

Original issue reported on code.google.com by fdsavv...@gmail.com on 4 Aug 2013 at 8:42