bobbyb1980 Posted May 6, 2012 Posted May 6, 2012 Hey guys. My internet is running ultra slow today making googling a pain and I have a question that I am hoping has a simple answer. After like 8 hours Reaver finally cracked my router's WPS pin. My question is now how do I connect to this router with said pin? Quote
bobbyb1980 Posted May 6, 2012 Author Posted May 6, 2012 After looking at a few reaver tutorials it appears that I am supposed to get the WPAPSK in plaintext, but reaver is giving me a 64 character WPA-PSK which does not appear to be what the average user would input into the password field... Any ideas? Quote
bobbyb1980 Posted May 6, 2012 Author Posted May 6, 2012 Nope, I get a bad password error... anyway to use this WPS pin to my advantage? Quote
Mr-Protocol Posted May 6, 2012 Posted May 6, 2012 Try converting the hex into ASCII and see if it makes your password? Quote
bobbyb1980 Posted May 6, 2012 Author Posted May 6, 2012 I tried that but I'm not so sure it's hex. I'm going to post it here. If anyone does anything malicious with it bobby will find you. IDLE 2.6.5 ==== No Subprocess ==== >>> int('0adc817f71464835a414b7fe4182473c9780b64dc238f3534924bd1b6db69d65', 2) Traceback (most recent call last): File "<pyshell#0>", line 1, in <module> int('0adc817f71464835a414b7fe4182473c9780b64dc238f3534924bd1b6db69d65', 2) ValueError: invalid literal for int() with base 2: '0adc817f71464835a414b7fe4182473c9780b64dc238f3534924bd1b6db69d65' >>> int('0adc817f71464835a414b7fe4182473c9780b64dc238f3534924bd1b6db69d65', 8) Traceback (most recent call last): File "<pyshell#1>", line 1, in <module> int('0adc817f71464835a414b7fe4182473c9780b64dc238f3534924bd1b6db69d65', 8) ValueError: invalid literal for int() with base 8: '0adc817f71464835a414b7fe4182473c9780b64dc238f3534924bd1b6db69d65' >>> int('0adc817f71464835a414b7fe4182473c9780b64dc238f3534924bd1b6db69d65', 16) 4912728601205072471650314642361117843458354680102371230006898230960697285989L Quote
bobbyb1980 Posted May 6, 2012 Author Posted May 6, 2012 I tried converting it from binary and hexadecimal and python didn't seem to like that. Finally when I tried to convert it from base 16 python accepted it but spit out even more meaningless numbers. The syntax is int('what you want to convert', base (2 for binary, etc)). I'd assume it's base 16 but who knows. '0adc817f71464835a414b7fe4182473c9780b64dc238f3534924bd1b6db69d65' is what reaver gave as the WPAPSK, what I want to convert. (Not so sure it's even convertible). Quote
Mr-Protocol Posted May 6, 2012 Posted May 6, 2012 Why don't you post the results that reaver gave? Ideally your password should be "testpassreaver" considering you are trying out reaver. Quote
bobbyb1980 Posted May 6, 2012 Author Posted May 6, 2012 [+] WPS PIN: '24995764' [+] WPA PSK: '0adc817f71464835a414b7fe4182473c9780b64dc238f3534924bd1b6db69d65' [+] AP SSID: '*****' Quote
Mr-Protocol Posted May 6, 2012 Posted May 6, 2012 Try the things suggested here: http://code.google.com/p/reaver-wps/issues/detail?id=282 Quote
bobbyb1980 Posted May 6, 2012 Author Posted May 6, 2012 (edited) That did it, thanks Mr. P! For anyone reading this, the solution is... reaver -i mon0 -b ... -p (put the pin it gave you here) -vv Then it should spit out the plain text pw within a few tries. Edited May 6, 2012 by bobbyb1980 Quote
redhook Posted May 10, 2012 Posted May 10, 2012 (edited) After looking at a few reaver tutorials it appears that I am supposed to get the WPAPSK in plaintext, but reaver is giving me a 64 character WPA-PSK which does not appear to be what the average user would input into the password field... Any ideas? I thought you said this was your router? If it is the WPA-PSK that Reaver spits out is the same password you configured for your wireless. That did it, thanks Mr. P! For anyone reading this, the solution is... reaver -i mon0 -b ... -p (put the pin it gave you here) -vv Then it should spit out the plain text pw within a few tries. Are you using Backtrack 5 R2? If so do this. apt-get update && apt-get upgrade That will update everything. Edited May 10, 2012 by redhook Quote
Atomix.Gray Posted May 16, 2012 Posted May 16, 2012 Nice find - I was wondering the same thing myself Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.