sara8319 / reaver-wps

Automatically exported from code.google.com/p/reaver-wps
0 stars 0 forks source link

WARNING: Failed to associate with FC:75:XX:XX:XX:XX (ESSID: (null)) #113

Closed GoogleCodeExporter closed 8 years ago

GoogleCodeExporter commented 8 years ago
A few things to consider before submitting an issue:

0. We write documentation for a reason, if you have not read it and are
having problems with Reaver these pages are required reading before
submitting an issue:
http://code.google.com/p/reaver-wps/wiki/HintsAndTips
http://code.google.com/p/reaver-wps/wiki/README
http://code.google.com/p/reaver-wps/wiki/FAQ
http://code.google.com/p/reaver-wps/wiki/SupportedWirelessDrivers
1. Reaver will only work if your card is in monitor mode.  If you do not
know what monitor mode is then you should learn more about 802.11 hacking
in linux before using Reaver.
2. Using Reaver against access points you do not own or have permission to
attack is illegal.  If you cannot answer basic questions (i.e. model
number, distance away, etc) about the device you are attacking then do not
post your issue here.  We will not help you break the law.
3. Please look through issues that have already been posted and make sure
your question has not already been asked here: http://code.google.com/p
/reaver-wps/issues/list
4. Often times we need packet captures of mon0 while Reaver is running to
troubleshoot the issue (tcpdump -i mon0 -s0 -w broken_reaver.pcap).  Issue
reports with pcap files attached will receive more serious consideration.

Answer the following questions for every issue submitted:

0. What version of Reaver are you using?  (Only defects against the latest
version will be considered.)

1. What operating system are you using (Linux is the only supported OS)?

2. Is your wireless card in monitor mode (yes/no)?

3. What is the signal strength of the Access Point you are trying to crack?

4. What is the manufacturer and model # of the device you are trying to
crack?

5. What is the entire command line string you are supplying to reaver?

6. Please describe what you think the issue is.

7. Paste the output from Reaver below.

root@root:~/reaver-1.3/src# reaver -i mon0 -b FC:75:16:F8:40:D8 -vv

WARNING: Failed to associate with FC:75:16:F8:40:D8 (ESSID: (null))
[!] WARNING: Failed to associate with FC:75:XX:XX:XX:XX (ESSID: (null))
[!] WARNING: Failed to associate with FC:75:XX:XX:XX:XX (ESSID: (null))
[!] WARNING: Failed to associate with FC:75:XX:XX:XX:XX (ESSID: (null))
[!] WARNING: Failed to associate with FC:75:XX:XX:XX:XX (ESSID: (null))

im using alfa awus051nh and reaver-1.3

Original issue reported on code.google.com by scotfis...@gmail.com on 9 Jan 2012 at 5:44

Attachments:

GoogleCodeExporter commented 8 years ago
Issue 114 has been merged into this issue.

Original comment by cheff...@tacnetsol.com on 9 Jan 2012 at 2:29

GoogleCodeExporter commented 8 years ago
Your pcap only has CTS and 802.11 ACK packets in it?

You probably can't associate because the SSID is cloaked: "ESSID: (null)". Try 
specifying the SSID manually. 

Original comment by cheff...@tacnetsol.com on 9 Jan 2012 at 2:31

GoogleCodeExporter commented 8 years ago

Original comment by cheff...@tacnetsol.com on 9 Jan 2012 at 9:20

GoogleCodeExporter commented 8 years ago
[deleted comment]
GoogleCodeExporter commented 8 years ago
@ scotfis you know the minimum of password leingh is 8 on WPA2 take a look here 
http://lastbit.com/pswcalc.asp or 
http://www.mathsisfun.com/combinatorics/combinations-permutations-calculator-old
.html here . There is also a Program called Pyrit you should take a look.

Original comment by patricks...@gmail.com on 10 Jan 2012 at 1:05

GoogleCodeExporter commented 8 years ago
@ scotfis .. i forgot to say i have pyrit and Cuda installed on my system and 
it compaires 11'000 PMK's a second.

Original comment by patricks...@gmail.com on 10 Jan 2012 at 1:19

GoogleCodeExporter commented 8 years ago
[deleted comment]
GoogleCodeExporter commented 8 years ago
@scotfis yes pyrit uses a dictionary, you could also generate with the program 
crunch a wordlist and pipe it directly into pyrit. But at the end, if you made 
calculation of all those possibilies that a 8 digit code can make, you see also 
how much time it gets to brute force the code (several years). I found a 
Internetside where you can send the handshake and they do the work, but this 
internetside does not exist anymore and you had to pay for ît. You see there 
is a moment that it is better to go out and drink a cup coffee and meet some 
people than to brute force this one...

You want to break into the same AP where you broke in with reaver before? if 
so, you remember the pin? when yes just.

reaver -i mon0 -b xx:xx:xx:xx:xx:xx -p xxxxxxxx -vv

-p use specified 4 or 8 digit WPS pin

Original comment by patricks...@gmail.com on 11 Jan 2012 at 12:12

GoogleCodeExporter commented 8 years ago
thx a lot paricks, it work for :)

reaver -i mon0 -b xx:xx:xx:xx:xx:xx -p xxxxxxxx -vv

u r life saver

Original comment by scotfis...@gmail.com on 12 Jan 2012 at 3:10

GoogleCodeExporter commented 8 years ago
anyone know how to find capture file incase want to restore season back? im 
used bt5 live usb 

Original comment by scotfis...@gmail.com on 18 Jan 2012 at 4:02

GoogleCodeExporter commented 8 years ago
/etc/reaver

Original comment by patricks...@gmail.com on 18 Jan 2012 at 4:07

GoogleCodeExporter commented 8 years ago
new problem but same treat:(

pic : http://imageshack.us/photo/my-images/215/screenshotksy.png/
      http://imageshack.us/photo/my-images/832/screenshot2vpe.png/

reaver file :http://www.woofiles.com/dl-281669-mZWTxgqL-B8A386A58080.wpc

Original comment by scotfis...@gmail.com on 30 Jan 2012 at 11:27