Results (
Vietnamese) 1:
[Copy]Copied!
Reported by leandro...@gmail.com, Sep 19, 2012 I have seen several open issues for this problem,and I apologize for opening a new one, but itseemed clear that the other people reporting thiswere trying it against routers they didn't own, andcouldn't provide debug information. I am testing thisagainst my own routers, and I can provide any captures needed. 0. What version of Reaver are you using? (Onlydefects against the latestversion will be considered.) Reaver 1.4, packaged with the latest version ofBacktrack. 1. What operating system are you using (Linuxis the only supported OS)? Backtrack Linux. 2. Is your wireless card in monitor mode (yes/no)? Yes. I tried both the internal card (Atheros AR9285)and an external TPLink TL-WN822N (sadly it's anAtheros AR9287, not that different). 3. What is the signal strength of the AccessPoint you are trying to crack? -33 for one -49, with the other using the internalcard. 90% for both in Wicd Network Manager. Oneis sitting in the same room, the other is across awall. 4. What is the manufacturer and model # of thedevice you are trying tocrack? TP-Link WR-841N and Linksys WRT120N (0x04) 5. What is the entire command line string youare supplying to reaver? Linksys: reaver -i mon0 -b 68:7F:74:DE:5C:16 -vvTPLink: reaver -i mon0 F8:D1:11:A1:70:7C -vv -L The TPLink hangs after association, hence the -L. 6. Please describe what you think the issue is. No idea. The output doesn't give me much to go on.I'm a general IT guy but I don't usually get into theinternals of wireless protocols. 7. Paste the output from Reaver below. root@bt:~# airmon-ng Interface Chipset Driver mon1 Atheros AR9287 ath9k - [phy1]mon0 Atheros AR9285 ath9k - [phy0]wlan1 Atheros AR9287 ath9k - [phy1]wlan0 Atheros AR9285 ath9k - [phy0] root@bt:~# airodump-ng mon0 CH 14 ][ Elapsed: 20 s ][ 2012-09-2001:24 BSSID PWR Beacons #Data, #/s CHMB ENC CIPHER AUTH ESSID 68:7F:74:DE:5C:16 -42 39 21 0 1 54e.WPA2 CCMP PSK Ramiro F8:D1:11:A1:70:7C -52 45 214 0 1154e. WPA2 CCMP PSK Leandro root@bt:~# reaver -i mon0 -b 68:7f:74:de:5c:16 -vv Reaver v1.4 WiFi Protected Setup Attack ToolCopyright (c) 2011, Tactical Network Solutions,Craig Heffner [+] Waiting for beacon from 68:7F:74:DE:5C:16[+] Switching mon0 to channel 1[+] Associated with 68:7F:74:DE:5C:16 (ESSID:Ramiro)[+] Trying pin 12345670[+] Sending EAPOL START request [+] Received identity request[+] Sending identity response[+] Received M1 message[+] Sending M2 message[+] Received WSC NACK[+] Sending WSC NACK [!] WPS transaction failed (code: 0x04), re-tryinglast pin[+] Trying pin 12345670[+] Sending EAPOL START request[+] Received identity request[+] Sending identity response [+] Received M1 message[+] Sending M2 message[+] Received WSC NACK[+] Sending WSC NACK[!] WPS transaction failed (code: 0x04), re-tryinglast pin [+] Trying pin 12345670[+] Sending EAPOL START request[+] Received identity request[+] Sending identity response[+] Received M1 message[+] Sending M2 message [+] Received WSC NACK[+] Sending WSC NACK[!] WPS transaction failed (code: 0x04), re-tryinglast pin[+] Trying pin 12345670[+] Sending EAPOL START request [+] Received identity request[+] Sending identity response[+] Received M1 message[+] Sending M2 message[+] Received WSC NACK[+] Sending WSC NACK [!] WPS transaction failed (code: 0x04), re-tryinglast pin[+] Trying pin 12345670[+] Sending EAPOL START request[+] Received identity request[+] Sending identity response [+] Received M1 message[+] Sending M2 message[+] Received WSC NACK[+] Sending WSC NACK[!] WPS transaction failed (code: 0x04), re
Being translated, please wait..