1

I have been trying out reaver and bully on my network and friends network, multiple different routers, but none of them finds anything.

The command for reaver that I run is:

reaver -i wlan0mon -c 6 -b xx:xx:xx:xx:xx:xx -vv -N -L -S -K 1

The output I get is below, it keeps saying receive timeout. I tried getting closer to the network, even sitting beside it, same problem:

[+] Switching wlan0mon to channel 6
[+] Waiting for beacon from xx:xx:xx:xx:xx:xx
[+] Received beacon from xx:xx:xx:xx:xx:xx
[+] Vendor: AtherosC
[+] Trying pin "12345670"
[+] Sending authentication request
[!] Found packet with bad FCS, skipping...
[+] Sending association request
[+] Associated with xx:xx:xx:xx:xx:xx (ESSID: xxxxx)
[+] Sending EAPOL START request
[!] WARNING: Receive timeout occurred
[+] Sending EAPOL START request

The two last lines just keeps getting repeated. I tried different parameters too.

The bully command I run looks like this:

bully wlan0mon -b xx:xx:xx:xx:xx:xx -c 6 -v 3 -d   

The output:

[!] Bully v1.1 - WPS vulnerability assessment utility
[P] Modified for pixiewps by AAnarchYY(aanarchyy@gmail.com)
[+] Switching interface 'wlan0mon' to channel '6'
[!] Using 'xx:xx:xx:xx:xx:xx' for the source MAC address
[+] Datalink type set to '127', radiotap headers present
[+] Scanning for beacon from 'xx:xx:xx:xx:xx:xx' on channel '6'
[+] Got beacon for 'xxxx' (xx:xx:xx:xx:xx:xx)
[+] Loading randomized pins from '/root/.bully/pins'
[!] Restoring session from '/root/.bully/xxxxxxxxxxxx.run'
[+] Index of starting pin number is '0000000'
[+] Last State = 'NoAssoc'   Next pin '62121651'
[+] Sent packet not acknowledged after 3 attempts
[+] Tx(DeAuth) = 'Timeout'   Next pin '62121651'
[+] Sent packet not acknowledged after 3 attempts
[+] Tx( Auth ) = 'Timeout'   Next pin '62121651'
[+] Sent packet not acknowledged after 3 attempts
[+] Tx(DeAuth) = 'Timeout'   Next pin '62121651'
[+] Sent packet not acknowledged after 3 attempts
[+] Tx( Auth ) = 'Timeout'   Next pin '62121651'
[+] Sent packet not acknowledged after 3 attempts
[+] Tx( Assn ) = 'Timeout'   Next pin '62121651'
[+] Sent packet not acknowledged after 3 attempts
[+] Tx(DeAuth) = 'Timeout'   Next pin '62121651'
[+] Sent packet not acknowledged after 3 attempts
[+] Tx(DeAuth) = 'Timeout'   Next pin '62121651'

Sometimes bully works and reaver too, (very rarely), but they never get anything, always pin not found. Am I doing something wrong?

I got tired of the errors and tried my own method, what I did was creating a list of all 8 digit combinations, so from 00000000 to 9999999, then I used aircrack to bruteforce the text file, and it actually found the pin for both routers, me and my friends router. I know that all WPS enabled routers has an 8 digit pin, and all 8 digit pins is listed in my text file, my problem however is, that not all WPS routers uses this pin, it can have a PSK that is different from the pin. I bruteforce the .cap file from airodump-ng.

So to sum up, these are my questions:

  1. Am I doing anything wrong with reaver / bully?
  2. Is it possible to get the WPS key by bruteforcing with my pin list, even though the router uses another password like "fj93jfo" instead of the 8 digit key, and the router is WPS enabled and not locked?
Reaverguy
  • 11
  • 2
  • To answer question 2: If the used password is not part of the ones you try, you will not discover it with your brute force attempt. – mhr Jun 18 '19 at 08:54

0 Answers0