![]() |
[request] reaver for n900 - wps pin brute force hack
hi
does anyone have the mood to port it to maemo ? google has the code http://code.google.com/p/reaver-wps/downloads/list ciao |
Re: [request] reaver for n900 - wps pin brute force hack
Funny, the first thing I did when I first read news about it was to google for "n900 reaver wps" ;)
Now I did it again and found your post. I would like to try against my different APs, too. N900 was my first thought, would be nice ... EDIT 03.01.2012: Reaver v1.3 is working on n900 - Requirements:
Latest changes to code: http://code.google.com/p/reaver-wps/source/list Known Problems: http://code.google.com/p/reaver-wps/issues/list Maemo SDK In Maemo SDK start a terminal, download the sources: Code:
Optional - get latest source code using svn Code:
svn checkout http://reaver-wps.googlecode.com/svn/trunk/ reaver-wps-read-only Edit Makefiles, change crT to cr (removing the T): http://www.imgbox.de/users/public/images/UprwojHt8q.png Code:
nano reaver-1.3/src/crypto/Makefile Compile sourcecode Code:
/scratchbox/login Now you should see 2 compiled binaries: http://www.imgbox.de/users/public/images/yzF9WiGkt1.png Text from reaver README Code:
OVERVIEW |
Re: [request] reaver for n900 - wps pin brute force hack
there is a python port somewhere on google (independend coded from another guy) and it starts on n900 but fails on forking the sniffer. google for wpscrack python.
ciao |
Re: [request] reaver for n900 - wps pin brute force hack
I am updating catalogues of my N900 while writing this didn't test yet, but do you have scapy and PyCrypto(dunno if its in maemo repo) installed?
Edit: Installing python-crypto python-scapy ettercap libpcap0,8 Think that dependencies are needed... Besides that, can't someone compile reaver? Only dependency seems to be libpcap. [Offtopic: The N900 is my only linux machine and I would love to know how to compile things just for N900. Can someone point me in the right direction? PM me if you are willing to help] Meanwhile, I will keep me busy getting that python version working. Going to sleep now... Regarding driver, I think loading the bleeding edge driver, (WL1251) is enough to let this program work |
Re: [request] reaver for n900 - wps pin brute force hack
Quote:
Maemo SDK Development Start here: http://maemo.org/development/ If you know VMware Player you can use this: http://wiki.maemo.org/Documentation/...Virtual_Images User: maemo pass: maemo sudo-pass: maemo More useful tutorial: http://www.nokiausers.net/forum/noki...r-running.html http://www.developer.nokia.com/Commu...K_installation Needed DNS-Fix for Vmware Image (/scratchbox/etc/resolv.conf) Change VM-Network to whatever you need (maybe NAT) run: ifconfig (note the eth-Number) dhclient eth5 (replace 5 with whatever it is for you) http://iloapp.mikek.dk/blog/developer?Home&post=49 Then do a reboot. |
Re: [request] reaver for n900 - wps pin brute force hack
Setup n900 and run compiled reaver binary
You need to be root for most actions, installations and running the applications airmon-ng and reaver. You need to install this package on your n900: Libpcap0.8 0.9.8-5+0m5 http://maemo.org/packages/package_in...8/0.9.8-5+0m5/ Direct Download: http://repository.maemo.org/pool/mae...+0m5_armel.deb on n900 shell (as root): Code:
sudo gainroot Then transfer Reaver-Binaries and database to your n900, copy reaver to the right location and do a testrun: /opt/reaver/etc/reaver.db /opt/reaver/bin/reaver /opt/reaver/bin/walsh symlinc to: /usr/local/bin /usr/local/etc/reaver Setup: Code:
mkdir -p /usr/local/etc/reaver OPTIONAL - change MAC so xou can easily identify your actions in your AccessPoints Logs Code:
From the README-file: Code:
USAGE Bleeding-edge wl1251 driver for Maemo Fremantle Monitor mode on all channels: yes http://david.gnedt.eu/blog/wl1251/ README: http://david.gnedt.eu/wl1251/README Aircrack-ng Install Aircrack-ng on your n900. Run airmon-ng to create a monitoring interface: If you want to cahneg your MAC-Address you need to change it BEFORE creating the mon0 interface! Code:
ifconfig wlan0 down Now you should have an entry with "mon0". Airodump-ng To verify if it is working as expected run: Code:
airodump-ng mon0 Stop it by pressing ctrl + c. Now you can run reaver (change example mac with bssid from you AP): Code:
reaver -i mon0 -b 00:01:02:03:04:05 -vv It should look like this: http://www.imgbox.de/users/public/images/GjZiBWZZ7G.png OPTIONAL - Set WLAN0 to Monitoring-Mode Code:
ifconfig wlan0 down there you should see wlan0 IEEE 802.11bg Mode:Monitor |
Re: [request] reaver for n900 - wps pin brute force hack
just tried and reaver seems to work but does not work - strace does not show any activity and airodump also not. using '-c' for channel switching on reaver shows a bit more activity regarding switching frequency.
seems there is more than just compiling. tx for the port to n900 anyway. ciao and happy new year |
Re: [request] reaver for n900 - wps pin brute force hack
very interest .hope it can fine work on N900.
|
Re: [request] reaver for n900 - wps pin brute force hack
you need at least a wlan driver that supports monitoring mode!
it will not work with stock n900 kernel and driver! but the bleeding edge driver should support full monitoring support and i hope somebody get it to work with it. see comparison chart: http://www.imgbox.de/users/public/images/W13WJLeK03.png and have a look at how it would work with pc linux (mon0 interface): http://www.youtube.com/watch?v=5_gELLGJSY8 |
Re: [request] reaver for n900 - wps pin brute force hack
hi
i tried both drivers (stock and b.edge - both in monitor mode) - same result. same result i had with one wlan adapter i use with linux. seems reaver supports only certain wlan drivers. ciao |
All times are GMT. The time now is 16:44. |
vBulletin® Version 3.8.8