phukov87 / reaver-wps

Automatically exported from code.google.com/p/reaver-wps
0 stars 0 forks source link

99.99% Reaver repeats same pin witn no m5 packets #578

Open GoogleCodeExporter opened 8 years ago

GoogleCodeExporter commented 8 years ago

0. What version of Reaver are you using?  (Only defects against the latest
version will be considered.)

, reaver 1.4

1. What operating system are you using (Linux is the only supported OS)?

Backtrack 5 r3 usb boot

2. Is your wireless card in monitor mode (yes/no)?
yes

3. What is the signal strength of the Access Point you are trying to crack?

-60

4. What is the manufacturer and model # of the device you are trying to
crack?
BtHub4
5. What is the entire command line string you are supplying to reaver?
reaver -i mon0 -b CC:BB:33:A3:BD:7C -d 0 -t 0 -N -S 

6. Please describe what you think the issue is.

Hi everyone. For some reason I run an attack against an AP and I got to 99.99% 
with pin tstarting with 998 well i mean what are the chances that the password 
is not in the range of 0 to 998 .... and no m5 packets are sent. or recieved 
therefore I assume the first part of the pin was incorrect... If so then reaver 
missed the correct pin? I recieved Warning: Timeout and 0.02 and 0.03 error, 
however the cracking progressed... Also I noticed that when crakcking reaver 
does this:

Trying pin 23456789
Trying pin 23457780
Trying pin 23458781

Something like this, therefore Im not sure but is it possible that reaver 
missed the correct pin??

7. Paste the output from Reaver below.

Sadly I do not have it. I'm writing from Windows and I failed to record the log

however

m1 packets
m2 packet
m3 packet
m4 packet
Wsc Nack
Eapol REquest
Trying pin XXXXXXX
^repeat.... 

and then it goes to 99.99% and it took me 20 hours to do it.. repeats the same 
pin over and over which start with 998.......... chances are so low......

Original issue reported on code.google.com by Krer...@gmail.com on 12 Nov 2013 at 12:15

GoogleCodeExporter commented 8 years ago
Kind people help me :P

Original comment by Krer...@gmail.com on 12 Nov 2013 at 12:17

GoogleCodeExporter commented 8 years ago
hi! test o bully https://github.com/bdpurcell/bully  see and report if 
success... 

Original comment by deltomaf...@gmail.com on 12 Nov 2013 at 1:42

GoogleCodeExporter commented 8 years ago
Anyone ever figure this out?  I'm having this issue now.  Reaver claims it 
found the first four pin numbers but still only gets a M1, M2, M3, and M4 
packets.  What gives?  Is it a false positive or something?

Original comment by psychede...@gmail.com on 26 Aug 2014 at 6:44

GoogleCodeExporter commented 8 years ago
guys , pleaseee help me :(((
i install bully and do commands right !
but i get this ! :

root@Max:~# bully -b xx:xx:xx:xx:xx:xx -c 6 -T  mon0
[!] Bully v1.0-22 - WPS vulnerability assessment utility
[+] Switching interface 'mon0' to channel '6'
[!] Using '00:11:22:33:44:55' for the source MAC address
[+] Datalink type set to '127', radiotap headers present
[+] Scanning for beacon from '60:a4:4c:ee:cd:a4' on channel '6'
[!] Excessive (3) FCS failures while reading next packet
[!] Excessive (3) FCS failures while reading next packet
[!] Excessive (3) FCS failures while reading next packet
[!] Disabling FCS validation (assuming --nofcs)
[+] Got beacon for 'milk' (xx:xx:xx:xx:xx:xx)
[X] The AP doesn't appear to be WPS enabled (no WPS IE)

Help me :(

Original comment by pooya.si...@gmail.com on 29 Sep 2014 at 4:58