maemo.org - Talk

maemo.org - Talk (https://talk.maemo.org/index.php)
-   Applications (https://talk.maemo.org/forumdisplay.php?f=41)
-   -   [request] reaver for n900 - wps pin brute force hack (https://talk.maemo.org/showthread.php?t=81219)

karam 2012-01-07 16:02

Re: [request] reaver for n900 - wps pin brute force hack
 
well but i prefere to put them all in one package
and don't worry if you already have some of the in /usr/bin
it will replace them or simply will backup them as : mdk3 mdk3.old
if some one has his own build

i will put them in /opt because they might take some space

and for hydra6
the last time i tried the gui it worked fine
but i will try it again and see if something goes wrong ...then i will fix it

and perhaps YAMAS maintaner change the usage of ettercap to arpspoof as it is MUCH MUCH faster (just like MITM from a PC)

but what about reaver ? is it stable/usable ?
i will continue this in my thread
http://talk.maemo.org/showthread.php?t=73572
so i stop hijacking this one

ohh and btw i forgot to mention hamster !! it works well too

mr_pingu 2012-01-07 16:34

Re: [request] reaver for n900 - wps pin brute force hack
 
Well that's not needed, but I still think a pack isn't a convenient way. Backtrack is nothing more than al the hacking tools packed together but still as separate packages. Karam, package them one by one, so if reaver gets updated, and probably will(included in aircrack-ng), you don't have to repack all tools and besides that, you can decide which you want and which packages you don't want.

I know it's more work packaging them one by onep but it's really more convenient in the end. Which tutorial did you use for learning packaging and uploading to repos?

Good job on hamster, much faster indeed and besides that, with hamster it's easier for HTTP session hijacking (after firesheep).

Anyway, I think we should update the first post..

Before I forget to mention, reaver is working on our N900 as it's working on PC's. The only problem is it's still in early stages and most of the time is the AP cousing trouble and not reaver. WPS is almost on every model router different. Not reaver's problem..

disappear 2012-01-07 17:09

Re: [request] reaver for n900 - wps pin brute force hack
 
Hi to all,is this attack descrypt networks(wpa) with dictionary or not
regards

StefanL 2012-01-07 17:36

Re: [request] reaver for n900 - wps pin brute force hack
 
Quote:

Originally Posted by disappear (Post 1147174)
Hi to all,is this attack descrypt networks(wpa) with dictionary or not
regards

No, this is an attack on the WPS, not WPA encryption; completely different attack vector, which makes this one the hot topic of the day. I posted a little bit of background in post #41 above (or just go to post #2 :rolleyes: for a really big overview).

meShell 2012-01-07 18:34

Re: [request] reaver for n900 - wps pin brute force hack
 
New reaver version has a different installation script including a databasefile:

Code:

if [ ! -d /usr/local/etc/reaver]; then mkdir /usr/local/etc/reaver; fi
cp reaver.db /usr/local/etc/reaver/reaver.db
chmod a+rw /usr/local/etc/reaver/reaver.db
if [ -e walsh ]; then cp walsh /usr/local/bin/walsh; fi
if [ -e reaver ]; then cp reaver /usr/local/bin/reaver; fi


disappear 2012-01-07 19:12

Re: [request] reaver for n900 - wps pin brute force hack
 
Quote:

Originally Posted by StefanL
No, this is an attack on the WPS, not WPA encryption; completely different attack vector, which makes this one the hot topic of the day. I posted a little bit of background in post #41 above.
This is very interesting,and actually is a different way to crack own network.I found one demostration http://blog.nci.ca/wps-brute-force-c...s-and-solution how to crack under backtrack,but most people already disable wps after they learn for that method.Don't think that brute-force attack with dictionary is the best method to crack network,the problem is to find right dictionary.

regards

StefanL 2012-01-08 10:23

Re: [request] reaver for n900 - wps pin brute force hack
 
Quote:

Originally Posted by mr_pingu (Post 1147113)
Compiled walsh binary =) Reaver not included..
I can upload reaver if you want

had to run it with option -C else got FCK packet error

edit: walsh -i mon0
Scanning for supported APs...

[!] Found packet with bad FCS, skipping...
[!] Found packet with bad FCS, skipping...
[!] Found packet with bad FCS, skipping...

walsh -i mon -C

Scanning for supported APs...
00:11:22:33:44:55 example
11:22:33:44:55:66 SSID

Need to run it with sudo to make it work on my system. Run strip on your final compiled binary to make the executable smaller. Thanks for the upload.

mr_pingu 2012-01-08 13:17

Re: [request] reaver for n900 - wps pin brute force hack
 
Everything was done as root, so I my environment just kept firing Bad FCS packets ;)

What do you mean with "run strip", still noob in devel-stuff :p

StefanL 2012-01-08 13:35

Re: [request] reaver for n900 - wps pin brute force hack
 
Quote:

Originally Posted by mr_pingu (Post 1147431)
Everything was done as root, so I my environment just kept firing Bad FCS packets ;)

What do you mean with "run strip", still noob in devel-stuff :p

Code:

strip walsh
:)

mr_pingu 2012-01-08 14:26

Re: [request] reaver for n900 - wps pin brute force hack
 
1 Attachment(s)
Stripped reaver + walsh binary thankyou StefanL


All times are GMT. The time now is 14:24.

vBulletin® Version 3.8.8