Jump to content

Recommended Posts

Posted

Hey guys. My internet is running ultra slow today making googling a pain and I have a question that I am hoping has a simple answer.

After like 8 hours Reaver finally cracked my router's WPS pin. My question is now how do I connect to this router with said pin?

Posted

After looking at a few reaver tutorials it appears that I am supposed to get the WPAPSK in plaintext, but reaver is giving me a 64 character WPA-PSK which does not appear to be what the average user would input into the password field...

Any ideas?

Posted

I tried that but I'm not so sure it's hex. I'm going to post it here. If anyone does anything malicious with it bobby will find you.

IDLE 2.6.5      ==== No Subprocess ====
>>> int('0adc817f71464835a414b7fe4182473c9780b64dc238f3534924bd1b6db69d65', 2)
Traceback (most recent call last):
  File "<pyshell#0>", line 1, in <module>
    int('0adc817f71464835a414b7fe4182473c9780b64dc238f3534924bd1b6db69d65', 2)
ValueError: invalid literal for int() with base 2: '0adc817f71464835a414b7fe4182473c9780b64dc238f3534924bd1b6db69d65'
>>> int('0adc817f71464835a414b7fe4182473c9780b64dc238f3534924bd1b6db69d65', 8)
Traceback (most recent call last):
  File "<pyshell#1>", line 1, in <module>
    int('0adc817f71464835a414b7fe4182473c9780b64dc238f3534924bd1b6db69d65', 8)
ValueError: invalid literal for int() with base 8: '0adc817f71464835a414b7fe4182473c9780b64dc238f3534924bd1b6db69d65'
>>> int('0adc817f71464835a414b7fe4182473c9780b64dc238f3534924bd1b6db69d65', 16)
4912728601205072471650314642361117843458354680102371230006898230960697285989L

Posted

I tried converting it from binary and hexadecimal and python didn't seem to like that. Finally when I tried to convert it from base 16 python accepted it but spit out even more meaningless numbers. The syntax is int('what you want to convert', base (2 for binary, etc)). I'd assume it's base 16 but who knows.

'0adc817f71464835a414b7fe4182473c9780b64dc238f3534924bd1b6db69d65' is what reaver gave as the WPAPSK, what I want to convert. (Not so sure it's even convertible).

Posted (edited)

That did it, thanks Mr. P!

For anyone reading this, the solution is...

reaver -i mon0 -b ... -p (put the pin it gave you here) -vv

Then it should spit out the plain text pw within a few tries.

Edited by bobbyb1980
Posted (edited)

After looking at a few reaver tutorials it appears that I am supposed to get the WPAPSK in plaintext, but reaver is giving me a 64 character WPA-PSK which does not appear to be what the average user would input into the password field...

Any ideas?

I thought you said this was your router? If it is the WPA-PSK that Reaver spits out is the same password you configured for your wireless.

That did it, thanks Mr. P!

For anyone reading this, the solution is...

reaver -i mon0 -b ... -p (put the pin it gave you here) -vv

Then it should spit out the plain text pw within a few tries.

Are you using Backtrack 5 R2? If so do this.

apt-get update && apt-get upgrade

That will update everything.

Edited by redhook

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...