Académique Documents
Professionnel Documents
Culture Documents
###=========================
###========================= USE_R1=y
###=========================
###=========================
RX1=9
RY1=2
###=========================
###========================= LIVE1=240
###=========================
###========================= USE_LONG1=y
###=========================
####========================= MDKTYPE1=3
####=========================
###========================= MDKLIVE=1
###=======================
###========================= PAUSE=1
###=========================
###========================= REAVER_COUNT=y
###=========================
###========================= MDK3_COUNT=y
###=========================
###========================= WASH_COUNT=y
###=========================
###========================= DAMP_MDK=y
###=========================
###========================== ADVAN_TIME=120
###=========================
###========================= USE_AIRE1=y
###=========================
###========================= USE_AIRE0=n
###=========================
###========================= USE_DHSMALL=y
###=========================
###========================= MACSEL=n
###=========================
###========================= ASSIGN_MAC=XX:XX:XX:XX:XX:XX
###=========================
###========================= USE_PIXIE=n
###=========================
###========================= USE_FIRSTPIN=n
###=========================
###========================= RETESTPin=50
###=========================
1. Hi All,
First of all thanks for this lovely script, but there are
some concerns that I would like to point out.
I dont know if this is normal or not, coz the attack is
not suucessful.
Here are my observation:
So after running VMR-MDK-K2-2016R-011x9 script on
my router TP Link WR740N
2.
mmusket33
Senior Member
Join Date
Jul 2013
Posts
732
Reaver starts the brute force attack against a the WPS system. Status of WPS
unclear but pin count increased.
ATTEMPT 3 thru 5
Router appears partially locked
If the router provides more pins after resetting then this approach may work.
If the router stays locked and no more pins collected the VMR-MDK approach will
not work.
Suggestion if VMR-MDK does not work
Test to see if the router automatically unlocks the WPS system after x number of
seconds
From the command line(CL) run reaver
Make sure the -L is NOT in the CL.
Add the -l or --lock-delay to 100 "Set the time to wait if AP locks WPS pin attempt"
With a -l 100 reaver will attempt to collect pins every 100 seconds.
Run reaver and wait. If pin collection restarts just count the number of times reaver
attempts to collect pins before pin count restarts.
For example if reaver tries 10 times before pin count retarted then 100 times 10 =
1000 seconds.
Now set your -l to 1200 run reaver from the CL and sit back.
You can tweak the 1200 lower if the attack develops a pattern.
MTeams
Reply With Quote
3.
machx
Junior Member
Join Date
May 2015
Posts
25
Even after restarting the router the PIN doesn't disable. You have to manually
disable the PIn if you want to continue with the attack.
The question is: If I install the old script which is VMR-MDK011x8 for Kali 1.1.0, will
it work better than the new script on Kali 2016 rolling.
I have heard that this script gives false results on most Kali 2016 rolling edition..
Please advice MTeam.
Thank you.
Reply With Quote
4.
mmusket33
Senior Member
Join Date
Jul 2013
Posts
732
5.
machx
Junior Member
Join Date
May 2015
Posts
25