Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

new wps attack method: arbitrary string method option "reaver -p" #40

Closed
kimocoder opened this issue Jun 28, 2017 · 4 comments
Closed

Comments

@kimocoder
Copy link
Contributor

more information on the feature/method may be found -right here- but there is also more info (for specially interested) -right here- too.

  • also a feature that should find it's way into "wifite" in the future

thanks to @binarymaster for this feature, but also @kcdtv & @rofl0r at the t6x repo.

@kimocoder kimocoder changed the title new wps attack method: arbitrary string methos option "reaver -p" new wps attack method: arbitrary string method option "reaver -p" Jun 28, 2017
@wikijm
Copy link

wikijm commented Aug 11, 2017

reaver -p "" will be very useful for French user.
Since few days, almost every "SFR_------" and "Livebox_------" ISP box are vulnerable to NULL pin.

To exploit this, you just have to:

  • Put wifi dongle to monitor mode with sudo airmon-ng start wlan0
  • Scan AP around you to find those with ESSID which start by "SFR_------" or "Livebox_------" and grab BSSID and channel
  • Launch t6x/reaver-wps-fork-t6x like this: sudo ./reaver -i wlan0mon -b 00:11:22:AA:BB:CC -p "" -vv -c 6
  • Get password in less than 10 sec

@rofl0r
Copy link

rofl0r commented Aug 11, 2017

btw, we also added a -j (json output) to wash, which should come in quite handy for 3rd party scripts. we agreed internally on not changing the output format anymore, so it should be safe to depend on that format.

@kimocoder
Copy link
Contributor Author

Thanks for the note sir!

@kimocoder
Copy link
Contributor Author

This feature has been added to pixiewps repo, more information could be found here. thanks everyone 👍

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants