Jump to content

Search the Community

Showing results for tags 'wps'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud CĀ²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start





Website URL







Enter a five letter word.

Found 19 results

  1. Hey all! I have a problem with pixie-dust attack on my nano: When executing pixiewps I receive follow: But from kali all work fine: And one more: some times reaver say me "Segmentation fault" Reaver v1.6.3 WiFi Pineapple Nano (2.4.1)
  2. Module: wps Version: 1.1 Features: Install dependencies Manage Reaver / Bully options Scan APs View if WPS is enabled on AP Run History Change log: 1.2 Add timer to know when the scan will be finished 1.1 View if WPS is enabled on AP
  3. Hi guys, I have a problem: I want to hack my Wifi but all the attacks which I found only worked for WPS 1.0 but not on my WPS 2.0. Of course I am open minded for other ways to hack my wifi but none of the attacks which I found worked.šŸ™„šŸ˜ž
  4. Hi guys, I have questions. I have pin and ssid of a hiden network but i don't know the way to find key? Thank's
  5. More and more routers are becoming resistant to the Reaver magic. That's a good thing, because we all want easy and secure working hardware in our (grand-)parents' homes. But are they really secure? Today I had an encounter with a stubborn fellow that tried to stop me from brutally forcing myself into his backdoor. Good job boy, you kept me out, you're safe! Yeah right... So I fired up another command: mdk3 mon0 a -a [MAC] -m Let that rip for a minute, tried reaver again, bingo! It accepted my brute force methods again. But after a few minutes it locked up again. Time for some more of tha
  6. Reaver 1.6 As you may or may not know Reaver have gone approx. two years without updates. It recently got a big update v1.6 I haven't heard or seen anything about the newest version being compiled for our devices, so i took matters into my own hands and managed to compile it properly. I thought it'd be smart to make a thread about it, where people can post any bugs/issues that they're experiencing, and i'll see if i can get it fixed. But also to let people know that there exist a new and improved version now. My GitHub repo. contains the Makefile needed to compile it with
  7. Helle all, I would like to install the latest version of reaver (1.6.1) this version can send an empty pin "NULL_PIN". I have a first error message to compile and I do not know how to install gcc, can you help me ? Git: https://github.com/t6x/reaver-wps-fork-t6x 0day with reaver 1.6.1: http://www.crack-wifi.com/forum/topic-12166-0day-crack-box-sfr-nb6v-en-deux-secondes-par-pin-null.html root@Pineapple:~/reaver-wps-fork-t6x-master/src# ./configure -ash: ./configure: Permission denied root@Pineapple:~/reaver-wps-fork-t6x-master/src# chmod +x configure root@Pineapple:~/reaver
  8. So, I use ParrotOS. A week ago it updated from 3.6 to 3.7 moving the kernel from I believe was 4.4 to 4.11. Okay, after that happen, all wps attack I can do no longer work. Wash works but reaver and bully does not, at all. Issue is posted on t6x repository for reaver. A few of the contributors have responded to a few people having the same issue going to the new version of Kali. Issue is either association issues in reaver followed by repeated send and receives and either a deauth, timeout or looping EAPOL messages. All my stuff running ParrotOS was already on 3.7 and had the sa
  9. CoastalCPU


    I hate to sound like an incompetent newbie, however the videos out there seem to be very dated and I am looking for some help. I have tried to get the Module WPS to work. I believe I got the basics running and my Tetra start flashing like crazy on the 3rd light which I believe means it is trying to brute force into the access point. Where are the logs? How can I tell if it is active and what progress we have made. If close or your window times out and you reconnect to the modules page it wants you to start the config again. I am not newbie to wireless, however I am a newbie to trying
  10. Look at the video. Video Here I am unable to carry out wps attack and unable to deauthenticate the connected as well.
  11. Change log: [v1.1] *Added .pixie files that are saved with the latest reaver's -H option as an acceptable input file with -i (ex. -i /path/to/bssid.pixie) They are treated differently than text files containing pixie data to be parsed, as they are simply set to be executable and then executed since the command is already built at the end of files in the .pixie format and in executable form. *Added -pd / --pixie-dir option which allows you to scan through a directory and all subdirectories within it for .pixie files to execute and/or text files containing pixie data to parse. This expands on
  12. SSL stripping no longer works. I've been researching but gotten little results as to tutorials for other types of infusions. I want to get an infusion that can either get me wifi passwords or passwords to someone's accounts as they log into them. If possible, I would like some er infusions to start with downloading. I tried the wps infusion and it didn't work well with my router (which is why I want to use RubyReaver or Auto-Reaver). So, what other infusions could be used to monitor my other computer's web activities and the passwords that I get when I log in with my other computer (that I'm u
  13. Name WPS Features - Reaver options selection - Bully options selection - History - Select AP to attack from UI Screenshots
  14. Hello, I have the password for a wifi. Now usually i could go into the router and search in it for the WPS pin. But this router is a cheap Nexxt model and i cant find the pin, but i know they're always at the back of the router which i cant get to. I need the WPS pin in case the person tries to change his password. Then it be easy for me to get the new pasword by using the WPS Pin. My question is can i retrieve the wps pin using the wifi password. Thannks so much,
  15. I've been trying to get the Wifi Pineapple to be able to perform the pixie dust attack for quite a while, and I can't seem to be able to. I'm thinking the problem is with the modified Reaver you have to install, but I can't be sure. I've followed this guide: http://matthewhknight.com/autopixiewps/ (In case the link above is remove or something, just google AutoPixieWPS) On my PC and Laptop it works flawlessly, but whenever I try this on the pineapple, I'm no longer able to pick up WPS. If anyone has gotten this to work, or has any ideas, please let me know. Thanks.
  16. Hey guys! I just read an interesting article on cracking WPS by doing offline computations and figured I should share with you guys. Although I understand a good portion of this from playing with the Wifi Pineapple, this is still above my skill level to be able to implement myself. I would imagine the Mark V would be able to do this with an infusion, replacing the need for Reaver/Bully for a lot of routers with WPS. The link to the article is: http://www.engadget.com/2014/08/31/wifi-protected-setup-flaw/ Check out the SlideShare presentation for the information. I think this would be a great
  17. So I'm not sure where to ask this, the mods at the Kali forums called this "general IT help" and deleted my question ha. Anyway, I've been playing around with Reaver again with my new router, and like the title says, can't seem to get any faster than 42-ish seconds per pin. The commands I used to even get it that 'fast' are as follows: Change my interface to same channel as router: iwconfig mon0 channel 1 Manually associate to my router: aireplay-ng -1 0 -a <router bssid> -h <my mac address, of mon0> -e <router essid> mon0 --ignore-negative-one
  18. { It's very difficult to express myself in English, I hope you will be able to understand me } (and if someone speaks French or German, it would be great ! ) I would like to create a WPA2 encrypted rogue AP with WPS (PBC) so that everyone who's trying to connect to it, does not need to type the right WPA passphrase on his computer. I already did it on my Kali Linux machine and it worked fine but I don't know how to activate the WPS (PBC) on an AP on my Wifi Pineapple MKV . Can someone help me ? Best regards, Fred.
  19. Guest

    Reaver 1.5

    Hi guys, anyone noticed that Reaver has been updated to 1.5? I think it's still in beta. It's changed a bit I think What do you guys think? how to install: make sure you have the libpcap and libsqlite3-dev libraries if you are on Kali. svn checkout http://reaver-wps-fork.googlecode.com/svn/trunk/ reaver-wps-fork-read-onlycd reaver-wps-fork-read-only/src./configuremake distclean && ./configuresudo makesudo make install
  • Create New...