- Apr 26, 2015
And then the password is vendor generated like TZ4GZ7J4KL7P9UT1B36Q9 xD
Oh wow, that sounds pretty cool in my earsI read somewhere a couple of years ago that ATI cards were not only faster than nvdia, BUT SIGNIFICANTLY faster lol. If I remember the performance were at least doubled.
I actually cracked all the wifi networks near my house. The hardest password I have found on WPA took me 2 days and it was "spirou75". LOL
I have a GTX980ti AMP EXTREME, it would be fun if you could provide a cap file and actually make a contest on who finds the pass first !
Indeed that's in fact possible and e.g. UPC routers are mostly like that unless user messed with defaults.And then the password is vendor generated like TZ4GZ7J4KL7P9UT1B36Q9 xD
You can work something out with a dish satellite and an external wifi usb dongle with usb extension to get low signal. I did it in my 8 feet long fishing boat, far from civilization, trying to get internet access from a house nearby. My setup gave me a boost of about 30 feet.But first things first... i have 2 major problems: 23 out of 28 APs discovered are like -80 to -92. So i will definitely need a better antenna.
Reaver , for the people who does not know, it's a brute force tool for routers that have WPS (Wi-Fi Proteted Setup) enabled. The WPS technology it's used to easily setup new clients to Wireless Networks using a PINCode (There are other mechanisms like NFC, PBC and USB , but I'm not going into that now).Lots of routers still vulnerable to reaper attacks, usually use this method in my imaginary hacking adventures that never happen ever.
reaver -i <monitor_iface> -c <wifi_channel> -b <access_point_MAC> -vv
Altough I'm agree with you and Nirvana1327 comment, in my experience it's always worth the try since the attack it's a matter of seconds, and as @0day says there are still some vulnerable routers out there and it's a cheap attack.I know of a case when reaver took just a few seconds to finish. Still not sure how was that possible but it worked. Sadly, in many other cases there was a cooldown and some also went into locked mode after short time and never got back to normal mode since. A few more cases were even less optimistic - there were loops consisting of timeouts, repeats and some error codes (mostly in TP-LINK routers) and nothing seemed to help. Also, many routers seem to kinda freeze reaver - it will wait forever on "waiting for beacon" even though those APs actually push lots of beacons which is easy to see with other tools. Not sure what's wrong there.
I found this interesting comment somewhere:
I might agree with that guy. That's exactly what i noticed, too. So either luck with crappy device/admin or no banana.Nirvana1327 says:
August 18, 2015 at 4:17 pm
Reaver is dead. All new routers stop Reaver in its tracks. Yes there are some legacy old crappy routers out there still vulnerable to the WPS attack but they are becoming less and less common with time. Consider the Reaver code hasn’t been updated in 3 years now. You’ll have rely on more serious methods to break WPA encryption which isn’t as cookie cutter newbie friendly like Reaver was. Reaver was great for its time but alas all good things come to an end.