Jump to content

raz0r

Active Members
  • Posts

    198
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by raz0r

  1. Got it up and running but it keeps rebooting my pineapple. Can someone help me please Regards Raz0r
  2. I'm not doing anything with it just using it as a repeater in my office, as for a power source its plugged into the 240 mains Kind Regards Raz0r
  3. @ tabbekThanks for this fella good find :) Regards Raz0r
  4. My bad fella i do apologies m8 Regards Raz0r
  5. You know what i find strange is when i have been attacking an AP for a long time i lose the signal strength so all i done was reinstall the infusion but made sure i backed up the files. Any way good luck fella Regards Raz0r
  6. Please help me chaps for some unknown reason my pineapple keeps rebooting i have flashed it bit it keeps doing it, it will be OK for like 10-20 min then that's it BAM !! Any ideas would be helpful Kind Regards Raz0r
  7. Yea im playing with it now and its says wrong login for the email but its right. Can someone please help me Regards Raz0r
  8. Go over to the WPS thread cheeto has done a vid :) Raz0r
  9. Disabled m8 :) Take a look at the vid Regards Raz0r
  10. Thanks for the update keep us posted :) Raz0r
  11. Good to hear its up and running again :) Raz0r
  12. Try clearing your cach Then refresh Raz0r
  13. Well done buddy thanks for the credit. Why dont you post this in the tutorial section Raz0r
  14. Also the best way to lern is not by scripts but the manual way other wise people will call u a script kiddie Learn the hard way first , that script is good for mitm and evil twin I believe ;) Raz0r
  15. Wifislax is good I've been using it but I'm a Kali fan I have been using it since it started off now I'm 31 lol and still love security . Believe me m8 translate that page and sign up. Download the script and use it on Kali But only on your own router other wise u might get into trouble Regards Raz0r
  16. Yea I find that also with bully sometimes But I have a little present for you one that has been over looked !! I'm no good at PHP but I got friends who are How about making this into an infusion !!! I have used it many times on routers my own of course http://lampiweb.com/foro/index.php?topic=9834.0 Now what about if this were to be an infusion download the script in Kali and let me know what you think Raz0r
  17. Then I'm not to sure I'm affraid someone here maybe able to assist you further Regards Raz0r
  18. Try getting a little closer to the AP or get a better antenna buddy Raz0r
  19. Good to hear its working for you :) Try attacking it with Bully and use the -D option as it detects lockouts. Or you could try putting a delay in with Reaver Best thing to do is try different settings and see what works for you. usage: bully <options> interface Required arguments: interface : Wireless interface in monitor mode (root required) -b, --bssid macaddr : MAC address of the target access point Or -e, --essid string : Extended SSID for the access point Optional arguments: -c, --channel N[,N...] : Channel number of AP, or list to hop [b/g] -i, --index N : Starting pin index (7 or 8 digits) [Auto] -l, --lockwait N : Seconds to wait if the AP locks WPS [43] -o, --outfile file : Output file for messages [stdout] -p, --pin N : Starting pin number (7 or 8 digits) [Auto] -s, --source macaddr : Source (hardware) MAC address [Probe] -v, --verbosity N : Verbosity level 1-3, 1 is quietest [3] -w, --workdir path : Location of pin/session files [~/.bully/] -5, --5ghz : Hop on 5GHz a/n default channel list [No] -B, --bruteforce : Bruteforce the WPS pin checksum digit [No] -F, --force : Force continue in spite of warnings [No] -S, --sequential : Sequential pins (do not randomize) [No] -T, --test : Test mode (do not inject any packets) [No] Advanced arguments: -a, --acktime N : Deprecated/ignored [Auto] -r, --retries N : Resend packets N times when not acked [2] -m, --m13time N : Deprecated/ignored [Auto] -t, --timeout N : Deprecated/ignored [Auto] -1, --pin1delay M[,N] : Delay M seconds every Nth nack at M5 [0,1] -2, --pin2delay M[,N] : Delay M seconds every Nth nack at M7 [5,1] -A, --noacks : Disable ACK check for sent packets [No] -C, --nocheck : Skip CRC/FCS validation (performance) [No] -D, --detectlock : Detect WPS lockouts unreported by AP [No] -E, --eapfail : EAP Failure terminate every exchange [No] -L, --lockignore : Ignore WPS locks reported by the AP [No] -M, --m57nack : M5/M7 timeouts treated as WSC_NACK's [No] -N, --nofcs : Packets don't contain the FCS field [Auto] -P, --probe : Use probe request for nonbeaconing AP [No] -R, --radiotap : Assume radiotap headers are present [Auto] -W, --windows7 : Masquerade as a Windows 7 registrar [No] -Z, --suppress : Suppress packet throttling algorithm [No] -V, --version : Print version info and exit -h, --help : Display this help information root@Raz0r:~# reaver Reaver v1.4 WiFi Protected Setup Attack Tool Copyright (c) 2011, Tactical Network Solutions, Craig Heffner <cheffner@tacnetsol.com> Required Arguments: -i, --interface=<wlan> Name of the monitor-mode interface to use -b, --bssid=<mac> BSSID of the target AP Optional Arguments: -m, --mac=<mac> MAC of the host system -e, --essid=<ssid> ESSID of the target AP -c, --channel=<channel> Set the 802.11 channel for the interface (implies -f) -o, --out-file=<file> Send output to a log file [stdout] -s, --session=<file> Restore a previous session file -C, --exec=<command> Execute the supplied command upon successful pin recovery -D, --daemonize Daemonize reaver -a, --auto Auto detect the best advanced options for the target AP -f, --fixed Disable channel hopping -5, --5ghz Use 5GHz 802.11 channels -v, --verbose Display non-critical warnings (-vv for more) -q, --quiet Only display critical messages -h, --help Show help Advanced Options: -p, --pin=<wps pin> Use the specified 4 or 8 digit WPS pin -d, --delay=<seconds> Set the delay between pin attempts [1] -l, --lock-delay=<seconds> Set the time to wait if the AP locks WPS pin attempts [60] -g, --max-attempts=<num> Quit after num pin attempts -x, --fail-wait=<seconds> Set the time to sleep after 10 unexpected failures [0] -r, --recurring-delay=<x:y> Sleep for y seconds every x pin attempts -t, --timeout=<seconds> Set the receive timeout period [5] -T, --m57-timeout=<seconds> Set the M5/M7 timeout period [0.20] -A, --no-associate Do not associate with the AP (association must be done by another application) -N, --no-nacks Do not send NACK messages when out of order packets are received -S, --dh-small Use small DH keys to improve crack speed -L, --ignore-locks Ignore locked state reported by the target AP -E, --eap-terminate Terminate each WPS session with an EAP FAIL packet -n, --nack Target AP always sends a NACK [Auto] -w, --win7 Mimic a Windows 7 registrar [False] Example: reaver -i mon0 -b 00:90:4C:C1:AC:21 -vv
  20. I find it is better then Reaver BUT you need to be really close for it to work smooth, other wise you just get timeouts !! Yea get a good outdoor antenna but make sure you got the right connectors on the end m8 Let me know how u get on Regards Raz0r
  21. Not that i know of i have only been using a few infusions on there at the moment. Also take a look at bully but use the -C command i find that works good but you need to be close to the AP or have a very good antenna To be honest i leave mine at work lol i stick with Kali at the min cos i can get my jobs done very quick using it in VM player :) But the Mark V is a great tool just need more time with it. Regards Raz0r
  22. I also wouldn't have thought that as i don't have to do it in Kali Linux i was getting frustrated my self until i read something on here. Just strange that you don't have to do it on Kali, maybe someone else here could answer your question :) Raz0r
  23. Mine works fine m8 i was rushing ill do another one sec lol Also you need to be close to the AP for less errors :) http://www.sendspace.com/file/rxgx8u Regards Raz0r
  24. You can enable monitor mode while wlan1 is enabled BUT what you need to do is disable wlan1 before the attack ;) other wise it wont work Kind Regards Raz0r
  25. You need to enable it to scan for APS then disable it and start monitor mode on wlan1. it will work m8 trust me The reason i checked them boxes was so it remembers where i left off just in case it gets canceled some how and i don't have to restart the bloody thing again i highly recommend using that first box ;). The next box was so i get verbose out put and could see any errors using -vv but i just type in the box -v I'm not to worry about the verbose just sometimes nice to see whats going on. Don't forget the M5 M6 messages are good to see :) Kind Regards Raz0r
×
×
  • Create New...