Hello! I want to know whether this attack is limited to the known vulnerable chipsets, or if it can be used on more routers if more research is done ?
Printable View
Hello! I want to know whether this attack is limited to the known vulnerable chipsets, or if it can be used on more routers if more research is done ?
This attack worked on Arris models TG1672 and DG1670.
Modified reaver spits out info needed for pixiewps. wps pin in secs.
This attack could be potentially extended to more routers if more research is done. There are some other manufacturers that have not been checked yet (like Marvell, Intel, Qualcomm, Realtek...). Also, good entropy on embedded systems (with limited resources) is always a problem especially at boot.
The devices that are not affected are probably the ones which use hardware random number generators. Also systems running Linux / Hostapd seem secure.
I have nearly zero experience with this kind of stuff, so if you wanna jump in, do it. Anyone can contribute.
aye congrats wiire!! https://bugs.kali.org/view.php?id=2203 :cool:
I can't install pixiewps. I get this error when I type "make" in its src directory.
gcc -o pixiewps pixiewps.c -lssl -lcrypto -Wall -Werror
pixiewps.c:33:26: fatal error: openssl/hmac.h: No such file or directory
compilation terminated.
make: * [all] Error 1
did you install the development libraries for openssl?
Cheers
Is there any chance this to work on TP-LINK in the future ?
TP-LINK like this http://www.maytinhviettrung.com/1_ht...TL-WR740ND.jpg
tp-link is atheros addict but 4 models of TP-Link AP have at least one version with ralink chipset and this ones may probably be affected.(one was reported as but we never got the datas :p )
this are the models that are suspects :
Quote:
TP-LINK TD-W8901N v1 TE7TDW8901NV1 bgn RT63365E 2 MiB 8 MiB RT5390
TP-LINK TD-W8951ND v5 TE7TDW8951NDV5 bgn RT63365E 2 MiB 8 MiB RT5390R
TP-LINK TD-W8961NB v3.0 bgn RT63365E 2 MiB 8 MiB
TP-LINK TD-W8961ND v3.x TE7TDW8961NDV3 bgn RT63365E 64 MiB
TP-LINK TD-W8968 v2 TE7TDW8968V2 bgn RT63365E 8 MiB 64 MiB
Finally able to create my account in this forum
I already emailed the wiire on the tests I've done.
First of all I made a modified version of reaver to facilitate the tests, this modification is already do a pixie test when a pin is tested on reaver
[P] E-Nonce: 41: f2: 8c: 82: 53: 3b: df: ........
[P] PKE: 6b: 0e: 22: cb: cd: 21: ........
[P] WPS Manufacturer: Ralink Technology, Corp.
[P] WPS Model Number: RT2860
[+] Received message M1
[P] AuthKey: f7: fb: bc: 21: ab: 3b: 99: 70: 36: 8e: f1: a0: ........
[+] Sending message M2
[P] E-Hash1: 1e: d6: 12: 27: 8f: 12: 28: 21: 9a: 54: .........
[P] E-Hash2: d: f: 34: and: ac: 55: a4: 9e: b3: 95: 31: 7a: 61: b0: ........
[Pixie-Dust]
[Pixie-Dust][*] ES-1: 00: 00: 00: 00: 00: 00: 00: 00: 00: 00: 00: 00: 00: 00: 00: 00
[Pixie-Dust][*] ES-2: 00: 00: 00: 00: 00: 00: 00: 00: 00: 00: 00: 00: 00: 00: 00: 00
[Pixie Dust-][*] PSK1: 76: 46: 96: c7: 5d: e4: 8a: 86: .......
[Pixie-Dust][*] PSK2: 1b: 5e: 3e: 6b: 19: 89: 4b: 5c: .......
[Pixie-Dust] [+] WPS pin: 41368541
[Pixie-Dust]
[Pixie-Dust][*] Time taken: 0 s
[Pixie-Dust]
[+] Received message M3
[+] Sending message M4
If someone want this version, tell me
Now with relation to the TP-Link.
I believe it may be vulnerable to another type of problem.
I have a TP-Link 740N v1, is a very old router, think it 2004-2005
It has the Atheros chipset, Linux runs and uses the hostap together with the / dev / random.
But this firmware version for example has a problem in the generation of random numbers, it may be that this firmware version is with this problem.
The seed for generating the random number is based on the date (date, time, seconds) router
Every time I restart the modem, the seed to generate the random number is the same. So it is possible to make bruteforce on all dates, hours, seconds to find the current state of the seed. This makes it possible to generate future seeds to make bruteforce the pin.
It may be that this problem is only in this firmware version, do not have other routers to test or compare and without having them in the hands is difficult to make the tests.
But this problem certainly is present in many other models of routers.
Today I met a router where the E-Hash1 and the E-Hash2 was identical and there needed to make a modification in pixie for him to do the bruteforce correctly.
I will continue to develop and when I have more news come back to post.
Sorry for the English, I used a translator
Pixiewps 1.0.5 is out!
Added a partial implementation of a new attack! :)
Vulnerable devices: Realtek (ES-1 = ES-2 = Enrollee nonce). This attack doesn't always work. Also be sure not to use --dh-small with this one! Get the PKR from Wireshark and supply the Enrollee Nonce. Test and report!
Thanks to Dominique Bongard (again) and also to soxrok2212.
Bongard tweet: https://twitter.com/Reversity/status/586610963354357762
Rand function to implement: https://github.com/skristiansson/uCl...lib/random_r.c
I do not have a much larger practical interest in this attack vector other than as POC; and probably won't spend a ton of time testing it out or using it. but this is still some really nice work! Kudos :)
Here is my contribution
https://forums.kali.org/showthread.p...ie-Dust-Attack
i have the same problem!~ :D
http://www44.zippyshare.com/v/aEY5Jq61/file.html
I have TP-LINK TD-W8961ND with the same Chipset Ralink (RT2860) but when i tryed Reaver to get the infos it always get stock at M2 is there a solution please
pixie is not installing.:confused:
it says
gcc -o pixiewps pixiewps.c -lssl -lcrypto -Wall -Werror
pixiewps.c:46:26: fatal error: openssl/hmac.h: No such file or directory
compilation terminated.
make: *** [all] Error 1
even libssl-dev isnt installing. its searching for 1.0.1e-2+deb7u12 but the repository has 1.0.1e-2+deb7u16.
what to do..???:confused::confused::confused:
The position of the reaver wpc files when using these modded reaver programs is now:
/usr/local/etc/reaver/
Files names are the 12digit mac address(no colons) of the target followed by .wpc
Any unfinished work previously done with the stock version must be copied or moved from the /etc/reaver/ folder to the /usr/local/etc/reaver/ folder. To confirm file position use the following command in the terminal window.
locate "*.wpc"
MTeams
this thing is wicked, thank you so much. it makes wifi testing so much quicker but I'll forget all the commands. oh well, who needs typing when you have script.
with this give me always pin not found!!!
Theres any solution?
To: FrostElrick
Try this:
Copy the following data between the #### to a text file with leafpad in root and name the file sources.list
################
#placed in /etc/apt/ folder
deb http://http.kali.org/kali kali main contrib non-free
deb-src http://http.kali.org/kali kali main contrib non-free
deb http://security.kali.org/kali-security kali/updates main contrib non-free
deb-src http://security.kali.org/kali-security kali/updates main contrib non-free
deb http://http.kali.org /kali main contrib non-free
deb http://http.kali.org /wheezy main contrib non-free
################
Go to the /etc/apt folder and rename the existing sources.list file to sources.list.orig
ie sources.list.original
Now copy the sources.list file in root to the etc/apt folder
Get an internet connection open a terminal window and
sudo apt-get install libssl-dev
sudo apt-get install libpcap-dev
sudo apt-get install libsqlite3-dev
Now install your modded reaver and pixiewps
Now go to your /etc/apt folder and erase your sources.list then rename sources.list.orig back to sources.list
Musket Teams
You could try using FrankenScript to download it and set it up, you can then browse the setup output in the frankenscript window by scrolling back.
If you still get an error then I'd guess your kali installation is broken in some way.
Pixiewps 1.1 is out! :)
Download: GitHub
What's new:
- The previous attack now is fully implemented
- AuthKey computation if --dh-small is specified (also in Reaver). The data can be gathered from a .cap file (manually)
- Better input parsing with parameters length check
- More user friendly. Added some examples of use in the usage screen.
NOTE:
- In this version the computer/machine time you're running pixiewps on is IMPORTANT. Be sure it's set to the right date and time
- Althought now pixiewps can be run without a modded version of Reaver (using --dh-small), the modded version made by t6_x and datahead is still recommended
The (almost) full bruteforce for the new attack is performed using the option -f (--force). I say almost because it starts bruteforcing around the current machine time and goes backwards.
What is not implemented yet but may come in (a not near) future (so don't ask :)):
- Multithreading (I tried to do a 'quick and dirty' implementation but it did more harm than good)
- Read all data needed from a .cap (always with --dh-small)
Below an example of AuthKey computation:
http://i.imgur.com/Giac0q8.png
@wiire all always SUPER thanks!!
Thanks for the new update, but it starts to get confusing with all these arguments now :D can we get a small tutorial ?
Cant wait to try this new version. I will report back soon.
https://github.com/t6x/reaver-wps-fork-t6x/issues/11
Cheers
Extra
soo... this works for Atheros now?
What a beautiful Saturday midday!
Sun is shining, day off and this magnificent version 1.1 is out!
Great job wiire!
So i can confirm that all devices from rtl819x projects are vulnerable if their firmware is based on Realtek SDK (But why wouldn't it be based on the tool designed and provided by realteck to create them?)
To make it a litlle hard for pixiewps and to really fully try this new -f option ( brute force on seed with time backwarding) i reset my realteck device to factory default ( first build time in 2012)
In a cheap laptop with poor microprocessor (around 600 key/sec with aircrack-ng ).
http://pix.toile-libre.org/upload/or...1430562562.pnghttp://pix.toile-libre.org/upload/or...1430562605.pnghttp://pix.toile-libre.org/upload/or...1430562641.png
:confused:Quote:
Originally Posted by wn722
you should read back wiire posts in this tread
that's just three more arguments ( i think )Quote:
Originally Posted by Desuu
Basicaly if your router has a realtek chipset and you don't get the PIN using pixiewps 1.0 (or using pixiewps 1.1 without the hew features) it wil work with the new pixiewps 1.1 using .f argument
notice the possibility to compute the authkey form *.cap file that allows you to make a full "offline attack" just by grabbing the required strings in your M packets. (small dh key option , -S, has to be used with reaver and pixiedust)
@kcdtv
You should try using -v 3. It prints the seed (Unix datetime) into human readable date and time.
Also I've been told there a routers that after failing retrieving the right date and time from the Internet, reset it to 0 (1st January 1970).
Any problems compiling on Ubuntu at all?
@wn722
I'm afraid that Atheros and Marvell will remain unbreakable.
As a side note Atheros hired Jouni Malinen the creator of hostapd in 2008 and in 2011 was bought by Marvell. Read it from Wikipedia.
No problems at all in Ubuntu & Xubuntu :)
Sweet!Quote:
You should try using -v 3. It prints the seed (Unix datetime) into human readable date and time.
lolQuote:
Also I've been told there a routers that after failing retrieving the right date and time from the Internet, reset it to 0 (1st January 1970).
I can tell you that is not the case with rtl8192x based routers (i have alfa AIP-W525H and totolink NR301RT) that have been using for years... the farest they go back to is last build... both of mine are form 2012 and checking and i think, nut i may be wrong that we shouldn't have to go more backward than that date that appear in probes WPS : EV-2010-09-20 as i have the same for both routers which are form different month, it seems to be a genric base date time ..
this guys from atheros know who they hire! For sure we won't get es-1=es-2=0 with somobody like this beyond the code XDQuote:
As a side note Atheros hired Jouni Malinen the creator of hostapd in 2008 and in 2011
I think soxrok is going to upload a new tutorial. There are some examples at the bottom of the usage screen. But basically what you want to do normally is launching pixiewps without --force. Then if the pin is not found and pixiewps prints a warning saying that the router might be vulnerable, then you may wanna try with --force. What pixiewps does is using the current time and date as reference and going backwards trying to recover the seed because the router time and date might be not right (like set at factory time).
Also I set the default verbosity level to 2 but you may probably want to set it to 3.