Results (
Vietnamese) 1:
[Copy]Copied!
Musket Teams have ONLY come acrossWifi Routers that lock up after 10 pin requestregardless of the mac address requestingthe pins. We began aggressively locking theWPS systems of all Wifi Routers in range byrequesting pins till the router locked every time these routers showed an open state. Toour surprise one of the routers' keycompletion jumped to 91% after a few pinrequest cycles(ie 10 pins per cycle). This ofcourse would allow even WPS LockedRouters to be hacked given time and patience. The rule then is to request pinsanytime they are available. We do not wishto note the first six digits of this routers macaddress for fear software engineers whomight read this will quickly correct the flaw.We have had reports but have never seen Wifi Routers whose WPS locking is relatedto the MAC code addresses requesting thepins. In other words, if the same mac codeaddress requests X number of pins therouter locks. However random macaddesses requesting pins do not lock the router. Anyone finding a router reacting likethis should download Musket Team’svarmacreaver.sh. You can find the link tothe varmacreaver.sh download in theseforums. This tool was originally designed forexactly this WPS locking feature however we could never find a router that locked dueto repeated pin requests from a single macaddress only while ignoring request fromrandom mac addresses. Varmacreaver.shcan be set up to constantly change the macaddress after every pin request. We have cracked WPS locked routers the
traditional way or by brute forcing the
handshake. Anytime we do this we expend
some effort trying to break the routers'
username-password with hydra or brutus.
We have had equal success by doing a man in the middle attack with Cain/XP or
ettercap. We use Netcut/XP to shut down
the ability of the user-client to access the
internet. Invariably the user logs onto the
router while the MITM is in progress and we
get their password and username thru Cain. Just have patience. You can also
intermittently disrupt their system with mdk3
or again Netcut anything that might cause
the user to turn to the router and access it.
Using Ettercap you can try and automate
this with http://forum.aircrack-ng.org/ index.php/topic,401.0.html .
Once you have access to the router go into
the firmware pages and obtain the WPS key
by reading the firmware page. Like in magic
you now have their secret name. Users
rarely change the WPS Key just the WPA password. And even a temporarily open
WPS locked Router can be cracked in less
then 10 pin requests if you have their WPS
Key. So even if they change the WPA key
you are back in within a few days as you
have their secret name. Reseting the router is not covered here as it
is being explored in a blog led by
Being translated, please wait..
