claudiax69 Posted April 19, 2013 Share Posted April 19, 2013 i started trying to get my router's pin and wpa2 pass using reaver 1.4 just two days ago, i used airmon-ng start wlan0 to put my card into monitor mode.. after that i used wash to see what routers were wps enabled and all of them were (apparently) mine was one of them obviously. i went and used reaver -i mon0 -b 'BSSID' -vv everything was going smoothly (2 seconds/pin) until it reached 28.8% in about 2 hours. i started getting WPS transaction failed (0x04) and it just stuck there looping for about an hour until i decided to just cancel the thing. anybody knows what this error code means? anything that can be done to go around it? Quote Link to comment Share on other sites More sharing options...
Bountyhunter50 Posted April 25, 2013 Share Posted April 25, 2013 Try throwing an aireplay deauth at it before reaver :) Quote Link to comment Share on other sites More sharing options...
GuardMoony Posted April 26, 2013 Share Posted April 26, 2013 DOH. forgot to press post when i typed my message :( Euhm just wanted to say. That security on WPS has increased on most new routers. ( they start blocking on to many attempts ) also make sure your wireless does not start to connect to a other network. Quote Link to comment Share on other sites More sharing options...
WallE Posted April 26, 2013 Share Posted April 26, 2013 New router with Reaver protection. HSTS to prevent SSLstrip. windows 7 and iOs prevent karma module. We can't talk about phishing page anymore. Should have buy that pineapple 1 year ago. It look outdated now :( Quote Link to comment Share on other sites More sharing options...
koolkarnt Posted June 16, 2014 Share Posted June 16, 2014 DOH. forgot to press post when i typed my message :( Euhm just wanted to say. That security on WPS has increased on most new routers. ( they start blocking on to many attempts ) also make sure your wireless does not start to connect to a other network. Noted: The router Im working on is my technicolor tg587n v3 - 2011. this is proberly where they started the above security increase but this guy is still crackable alledgedly - i have found 1 post out there on the nets that say he took 5-7 days. Currently trying to get head around these 0x01 --> 0x04 codes and they really mean. This document here http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf explains very nicely the m1--> m7 messages and its meaning and some detailed info about wps and its flaws. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.