Results 1 to 50 of 65

Thread: Varmacscan2-0 an automatic multi-target reaver attack tool released

Threaded View

Previous Post Previous Post   Next Post Next Post
  1. #11
    Yeah yeah, i always look at the VARMAC_WPSWPA folder, no files are created in VARMAC_WHITELST here, cause i've never got the WPA pass from reaver (i guess the bssid is only white listed when wpa is found)...

    I determined the WPS system was disabled after the process because there's a file "PIN_FOUND-63576764-victim_essid-XX:XX:XX:XX:XX:XX" in VARMAC_WPSWPA folder
    but "airodump-ng --wps" shows nothing in the WPS field, and the device does not appear in wash scan.

    Code:
    root@kali:~/VARMAC_WHITELST# ls -n
    total 0
    Code:
    root@kali:~/VARMAC_WPSWPA# ls -n
    total 1
    -rw-r--r-- 1 0 0 50 Dec  4 03:26 PIN_FOUND-63576764-victim_essid-XX:XX:XX:XX:XX:XX
    Code:
     BSSID              PWR  Beacons    #Data, #/s  CH  MB   ENC  CIPHER AUTH WPS       ESSID
     XX:XX:XX:XX:XX:XX  -63        5        0    0   6  54e  WPA2 CCMP   PSK            victim_essid
    As this WPA not being cracked with reaver only occurs here, maybe it's an issue with my wlan adapters:

    WLAN0: Broadcom Corporation BCM4311 802.11b/g WLAN (rev 01)
    WLAN1: Ralink Technology, Corp. MT7601U Wireless Adapter

    Anyway, i'm happy with bully, it does the job.
    Last edited by brunoaduarte; 2015-12-05 at 14:23.

Similar Threads

  1. Replies: 18
    Last Post: 2017-01-12, 01:14
  2. A Reaver Based Multi-Target Pin Harvesting Program
    By mmusket33 in forum How-To Archive
    Replies: 10
    Last Post: 2014-10-29, 02:15

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •