Open GoogleCodeExporter opened 9 years ago
do test with bully https://github.com/bdpurcell/bully if success...
Original comment by deltomaf...@gmail.com
on 12 Nov 2013 at 1:44
UNFORTUNATELY IT'S A SAME PROBLEM..IT'S START ATTACK FORM 90.96 TO 99.99% AND
REPEAT SAME PIN THEN FAILED TO GET WPA KEY...I HOPE THIS PROBLEM FIXED IN THE
NEXT VERSION OF REAVER...THANK'S ANYWAY.
Original comment by KMNXP...@gmail.com
on 13 Nov 2013 at 7:32
I'm not sure, but I believe an attack decreasing could fool this protection.
Original comment by deltomaf...@gmail.com
on 13 Nov 2013 at 5:14
guys , pleaseee help me :(((
i install bully and do commands right !
but i get this ! :
root@Max:~# bully -b xx:xx:xx:xx:xx:xx -c 6 -T mon0
[!] Bully v1.0-22 - WPS vulnerability assessment utility
[+] Switching interface 'mon0' to channel '6'
[!] Using '00:11:22:33:44:55' for the source MAC address
[+] Datalink type set to '127', radiotap headers present
[+] Scanning for beacon from '60:a4:4c:ee:cd:a4' on channel '6'
[!] Excessive (3) FCS failures while reading next packet
[!] Excessive (3) FCS failures while reading next packet
[!] Excessive (3) FCS failures while reading next packet
[!] Disabling FCS validation (assuming --nofcs)
[+] Got beacon for 'milk' (xx:xx:xx:xx:xx:xx)
[X] The AP doesn't appear to be WPS enabled (no WPS IE)
Help me :(
Original comment by pooya.si...@gmail.com
on 29 Sep 2014 at 4:58
Original issue reported on code.google.com by
KMNXP...@gmail.com
on 12 Nov 2013 at 3:03