oh could there be progress with Atheros stuff???
Type: Posts; User: wn722
oh could there be progress with Atheros stuff???
cheers. good on Atheros for keeping it safe.
where?
......
soo... this works for Atheros now?
Zyxel Keenetic vulnerable
unknown chpset
[P] E-Nonce: 18:31:5b:b2:69:e3:1a:c1:55:8f:e5:6d:7d:41:9b:3b
[P] PKE:...
if it's any use for anyone
TP-LINK TL-WR841ND v8.x
WI1 chip1: Atheros AR9341
[P] E-Nonce: b0:74:6b:86:dd:ed:47:b7:63:2b:4c:12:12:d5:c1:4e
[P] PKE:...
uhm, anyone had any luck with atheros chipsets yet?
check the fcc id on sticker and use FCC ID lookup tool.
you can find on google.
or post your FCC ID here and i'll grab it for you
@Calamita
use the pcap file and run it through tshark.sh script = that'll extract the HW info.
or go to fccid tool and use FCC ID number, it's usually on the sticker
http://fccid.net/
that's a bummer...
hey any way to get the AK from wireshark only?
If anyone has luck on devices can you post your HW info?
didn't work for
TP link 841N v8 - AR9341
TP link 841N v9 - QCA9533-AL3A
TP link 720N v1 - AR9331
@ FurqanHanif
you can get it out M1,M2 messages in wireshark.
there's also tshark.sh script that can grab it for you. I forgot where I got it, I think it was part of wpsoffline tool download.
but...
cool.
does it matter if you use dec format or just plain string?
af:75:f6:2c:eb:08:c3:f9:71:72:22:92:04:6f:cd:0c
vs
af75f62ceb08c3f971722292046fcd0c
can you share a link?
cheers.
I was getting 00:00:xx:02 PK every now and then running with bare reaver. with -N -L -S option it was fixed.
@wiire
hm, can you look it up?
also did you use wpsOffline or pixiewps script?
no i meant i'm getting nothing when running it against the script.
I didn't see any tp-link in the list of supported devices.
c
anyone tried TP-Link devices?
I got some 740,841 and it's zip.
nah, i was just being thick - all it takes is to run reaver with one pin attempt.
I'm assuming you get all the data from one try though
edited **************8
i see.
one more quetion - these keys (ak, PKE,PKR, Ehash1/2) do they need to be part of same conversation?
OR any key is good?
ok,
is it AP chipset specific? or firmware?
big ups soxrox and musket for explanations.
hey, I'm testing it with TP-Link device on WN722N usb dongle (Atheros)
Atheros Communications, Inc. AR9271 802.11n
and nothing comes up with wpsOffline script.
can anyone ping me pixiewps.c...
copy.
How do you guys get the keys out of pcap file?
just use wireshark?
hm anyone tried this with TP Link WN722N?
anyone tested Aerial with tp-link wn722?
https://wikidevi.com/wiki/TP-LINK_TL-WN722N
hey. where exactly is that link?
in first post of this topic or there's another topic?
Hey folks.
I just installed the latest version of FruityWifi from repositories - ver. 2.1.2
Running it on latest Kali (VM) with TP-Link wn722 usb dongle
Looks neat and I was able to get AP going....
hey mate,
I got the FW installed from the repositories and few modules are not working:
- sslstrip, meterpreter, ngrep
I hit the start button on the contro panel and nothing really happens.
...
can you write that down?
i'd like to give it a go as well
cheers.
hey can anyone share the method of extracting
PKe
- PKr
- AuthKey
- E-Hash1
- E-Hash2
from cap files?
seems like there's an another project on Pixie Dust.
http://www.crack-wifi.com/forum/topic-11198-pixie-dust-attack-participez-a-la-recherche-avec-vos-echantillons.html#p75984
only it's in French....
I see.
Is it cleat text or you need to push the cap through some utility?
did you challenge the AP with reaver to get the data?
so for dummies
how did you extract these again?
- PKe
- PKr
- AuthKey
- E-Hash1
- E-Hash2
hey Quest
ya, I'm running
JUST upgraded and it's working now...
is FS still a live project?
I got the latest version and it keeps spitting out the WPA handshakes - cause they are BAD
what constitutes a bad handshake?
I'm testing it with my own wifi and the old scripty method with aireplay and airodump works fine.
apologies if this was addressed, but I couldn't find the info.
Getting a The captured handshake is bad, the file will be deleted. error with this linked above version.
Is there a later version...
hey rob,
I tried the same guide with my wn722n.
didn't work - can you share more about your experience?
yup same story.
so what does it do different compared to regular reaver?
hello everybody.
just got the script:
got handshakes captured in .cap files. But I can't see them in Available Capture Files list of the Attack Handshake Files menu...
Available Capture...
having the same issue with tp-link 722n usb wifi card on a VM host
checked and rechecked the syntax and order of the commands.
packet injection is supported as well...
the funny thing is that...