bobbyb1980 Posted May 6, 2012 Share Posted May 6, 2012 Hey guys. My internet is running ultra slow today making googling a pain and I have a question that I am hoping has a simple answer. After like 8 hours Reaver finally cracked my router's WPS pin. My question is now how do I connect to this router with said pin? Quote Link to comment Share on other sites More sharing options...
bobbyb1980 Posted May 6, 2012 Author Share Posted May 6, 2012 After looking at a few reaver tutorials it appears that I am supposed to get the WPAPSK in plaintext, but reaver is giving me a 64 character WPA-PSK which does not appear to be what the average user would input into the password field... Any ideas? Quote Link to comment Share on other sites More sharing options...
Mr-Protocol Posted May 6, 2012 Share Posted May 6, 2012 Try it? Quote Link to comment Share on other sites More sharing options...
bobbyb1980 Posted May 6, 2012 Author Share Posted May 6, 2012 Nope, I get a bad password error... anyway to use this WPS pin to my advantage? Quote Link to comment Share on other sites More sharing options...
Mr-Protocol Posted May 6, 2012 Share Posted May 6, 2012 Try converting the hex into ASCII and see if it makes your password? Quote Link to comment Share on other sites More sharing options...
bobbyb1980 Posted May 6, 2012 Author Share Posted May 6, 2012 I tried that but I'm not so sure it's hex. I'm going to post it here. If anyone does anything malicious with it bobby will find you. IDLE 2.6.5 ==== No Subprocess ==== >>> int('0adc817f71464835a414b7fe4182473c9780b64dc238f3534924bd1b6db69d65', 2) Traceback (most recent call last): File "<pyshell#0>", line 1, in <module> int('0adc817f71464835a414b7fe4182473c9780b64dc238f3534924bd1b6db69d65', 2) ValueError: invalid literal for int() with base 2: '0adc817f71464835a414b7fe4182473c9780b64dc238f3534924bd1b6db69d65' >>> int('0adc817f71464835a414b7fe4182473c9780b64dc238f3534924bd1b6db69d65', 8) Traceback (most recent call last): File "<pyshell#1>", line 1, in <module> int('0adc817f71464835a414b7fe4182473c9780b64dc238f3534924bd1b6db69d65', 8) ValueError: invalid literal for int() with base 8: '0adc817f71464835a414b7fe4182473c9780b64dc238f3534924bd1b6db69d65' >>> int('0adc817f71464835a414b7fe4182473c9780b64dc238f3534924bd1b6db69d65', 16) 4912728601205072471650314642361117843458354680102371230006898230960697285989L Quote Link to comment Share on other sites More sharing options...
Mr-Protocol Posted May 6, 2012 Share Posted May 6, 2012 I don't recognize any of what you posted. Quote Link to comment Share on other sites More sharing options...
bobbyb1980 Posted May 6, 2012 Author Share Posted May 6, 2012 I tried converting it from binary and hexadecimal and python didn't seem to like that. Finally when I tried to convert it from base 16 python accepted it but spit out even more meaningless numbers. The syntax is int('what you want to convert', base (2 for binary, etc)). I'd assume it's base 16 but who knows. '0adc817f71464835a414b7fe4182473c9780b64dc238f3534924bd1b6db69d65' is what reaver gave as the WPAPSK, what I want to convert. (Not so sure it's even convertible). Quote Link to comment Share on other sites More sharing options...
Mr-Protocol Posted May 6, 2012 Share Posted May 6, 2012 Why don't you post the results that reaver gave? Ideally your password should be "testpassreaver" considering you are trying out reaver. Quote Link to comment Share on other sites More sharing options...
bobbyb1980 Posted May 6, 2012 Author Share Posted May 6, 2012 [+] WPS PIN: '24995764' [+] WPA PSK: '0adc817f71464835a414b7fe4182473c9780b64dc238f3534924bd1b6db69d65' [+] AP SSID: '*****' Quote Link to comment Share on other sites More sharing options...
Mr-Protocol Posted May 6, 2012 Share Posted May 6, 2012 Try the things suggested here: http://code.google.com/p/reaver-wps/issues/detail?id=282 Quote Link to comment Share on other sites More sharing options...
bobbyb1980 Posted May 6, 2012 Author Share Posted May 6, 2012 (edited) That did it, thanks Mr. P! For anyone reading this, the solution is... reaver -i mon0 -b ... -p (put the pin it gave you here) -vv Then it should spit out the plain text pw within a few tries. Edited May 6, 2012 by bobbyb1980 Quote Link to comment Share on other sites More sharing options...
redhook Posted May 10, 2012 Share Posted May 10, 2012 (edited) After looking at a few reaver tutorials it appears that I am supposed to get the WPAPSK in plaintext, but reaver is giving me a 64 character WPA-PSK which does not appear to be what the average user would input into the password field... Any ideas? I thought you said this was your router? If it is the WPA-PSK that Reaver spits out is the same password you configured for your wireless. That did it, thanks Mr. P! For anyone reading this, the solution is... reaver -i mon0 -b ... -p (put the pin it gave you here) -vv Then it should spit out the plain text pw within a few tries. Are you using Backtrack 5 R2? If so do this. apt-get update && apt-get upgrade That will update everything. Edited May 10, 2012 by redhook Quote Link to comment Share on other sites More sharing options...
Atomix.Gray Posted May 16, 2012 Share Posted May 16, 2012 Nice find - I was wondering the same thing myself Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.