El libre pensamiento para un internet libre
No estas registrado.
Paginas:: 1
Hola comunidad.
Hoy me han instalado por parte de mi ISP un router dual band.
Estoy tratando de auditar WPS con otro router dual band con openwrt. Es lo unico que tengo en 5 gh.
Por los 2,4 es vulnerable a pixie . Espero que en breve caiga una actualizacion y le pongan una tirita a eso.
Pero por la banda de los 5 gh. reaver no llega a asociarse con el router. se queda esperando una respuesta que nunca llega y entra en loop
[email protected]:~# reaver -5 -i mon0 -b XXXXXXXXXXXX -c 52 -K -vvvv -N
Reaver v1.6.5 WiFi Protected Setup Attack Tool
Copyright (c) 2011, Tactical Network Solutions, Craig Heffner <[email protected]>
[+] Switching mon0 to channel 52
[+] Waiting for beacon from XXXXXXXXXXX
[+] Received beacon from XXXXXXXXXXXX
[+] Vendor: RalinkTe
WPS: A new PIN configured (timeout=0)
WPS: UUID - hexdump(len=16): [NULL]
WPS: PIN - hexdump_ascii(len=8):
31 32 33 34 35 36 37 30 12345670
WPS: Selected registrar information changed
WPS: Internal Registrar selected (pbc=0)
WPS: sel_reg_union
WPS: set_ie
WPS: cb_set_sel_reg
WPS: Enter wps_cg_set_sel_reg
WPS: Leave wps_cg_set_sel_reg early
WPS: return from wps_selected_registrar_changed
[+] Trying pin "12345670"
send_packet called from deauthenticate() 80211.c:333
send_packet called from authenticate() 80211.c:364
[+] Sending authentication request
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
[!] WARNING: Receive timeout occurred
send_packet called from deauthenticate() 80211.c:333
send_packet called from authenticate() 80211.c:364
[+] Sending authentication request
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
send_packet called from resend_last_packet() send.c:161
He probado con diversas opciones de reaver pero sin mejores resultados.
Es el mismo comando que uso para auditar por 2,4 y funciona.
La salida de airmon-ng
[email protected]:~# airmon-ng
Interface Chipset Driver
mon0 Atheros AR9300 ath9k - [phy1]
wlan0 Atheros AR9340 ath9k - [phy0]
wlan1 Atheros AR9300 ath9k - [phy1]
He hecho pruebas de inyeccion con aireplay -9 y por 5 gh inyecta, por si tuviera algo que ver.
Alguien sabe a que se debe esto? Gracias.
Ultima edición por javierbu (05-01-2019 02:43:48)
Desconectado
Hola. Interesante.
¿Nos puedes decir el modelo? ¿Podemos ver un paquete probe (wash- j) ?
Según lo que se ve es el PA que no responde pero habría que ver el trafico.
Estás en el canal 52 con lo cuál creo que no puede haber problemas por reglamentación CRDA (en algunos canales no puedes inyectar sin cambiar las reglas)
¿Has probado con wpa_cli? Método universal, sin modo monitor, para ataque pixie dust Si no te molesta, sería bien probar sin modo monitor para identificar la fuente del problema. Saludos
Desconectado
Hola kcdtv. Gracias por contestar.
Sobre el aparato, es un completo desconocido para mi, y no hay mucha informacion en la red sobre el y nuestras inquietudes.
wash:
[email protected]:~# wash -j -i wlan0 -c 11
{"bssid" : "00:72:63:xxxxxx", "essid" : "INFNITUMxxxx_2.4", "channel" : 11, "rssi" : -38, "vendor_oui" : "000C43", "wps_version" : 32, "wps_state" : 2, "wps_locked" : 2, "wps_manufacturer" : "Ralink Technology, Corp.", "wps_model_name" : "Ralink Wireless Access Point", "wps_model_number" : "RT2860", "wps_device_name" : "RalinkAPS", "wps_serial" : "12345678", "wps_uuid" : "bc329e001dd811b286010072639b4f70", "wps_response_type" : "03", "wps_primary_device_type" : "00060050f2040001", "wps_config_methods" : "210c", "wps_rf_bands" : "01", "dummy": 0}
^C
[email protected]:~# wash -5 -c 52 -j -i wlan1
{"bssid" : "00:72:63:xxxxxx", "essid" : "INFINTUMxxxx_5", "channel" : 52, "rssi" : -45, "vendor_oui" : "000C43", "wps_version" : 32, "wps_state" : 2, "wps_locked" : 2, "wps_manufacturer" : "Ralink Technology, Corp.", "wps_model_name" : "Ralink Wireless Access Point", "wps_model_number" : "RT2860", "wps_device_name" : "RalinkAPS_0", "wps_serial" : "12345678", "wps_uuid" : "bc329e001dd811b286010072639b4f72", "wps_response_type" : "03", "wps_primary_device_type" : "00060050f2040001", "wps_config_methods" : "210c", "wps_rf_bands" : "02", "dummy": 0}
^C
¿Has probado con wpa_cli? Método universal, sin modo monitor, para ataque pixie dust Si no te molesta, sería bien probar sin modo monitor para identificar la fuente del problema. Saludos smile
No habia probado. Muy interesante el metodo para depurar, pero aun no he sido capaz. Openwrt no me deja tener una interfaz en modo client o master sin un proceso de wpa_supplicant corriendo, si lo mato se reinicia. Sin wpa_supplicant corriendo solo puedo levantar en modo monitor y en otro, al que openwrt llama 802.11s, o Mesh, y iwconfig lo identifica como auto, Sepa dios que modo es ese, pero no llega a soltar el pin:
[email protected]:~# wpa_supplicant -K -d -Dnl80211,wext,hostapd,wir
ed -i wlan1 -c basic.conf
Successfully initialized wpa_supplicant
[email protected]:~# wpa_cli -i wlan1
wpa_cli v2.7
Copyright (c) 2004-2018, Jouni Malinen <[email protected]> and contributors
This software may be distributed under the terms of the BSD license.
See README for more details.
Interactive mode
> scan
OK
<3>CTRL-EVENT-SCAN-STARTED
<3>CTRL-EVENT-SCAN-RESULTS
<3>CTRL-EVENT-NETWORK-NOT-FOUND
scan_results
> bssid / frequency / signal level / flags / ssid
00:72:63:xxxxxx 5260 -43 [WPA2-PSK-CCMP][ESS] INFINITUM6786_5
> wps_reg
Invalid WPS_REG command: need two arguments:
- BSSID of the target AP
- AP PIN
Alternatively, six arguments can be used to reconfigure the AP:
- BSSID of the target AP
- AP PIN
- new SSID
- new auth (OPEN, WPAPSK, WPA2PSK)
- new encr (NONE, WEP, TKIP, CCMP)
- new key
> wps_reg 00:72:63:xxxxxx 12345670
UNKNOWN COMMAND
Ultima edición por javierbu (07-01-2019 00:19:39)
Desconectado
Misterio resuelto.
Era la ditancia.
Las pruebas las estaba haciendo a unos 6 metros de ditancia viendose entre ellos. Dando de si los cables de los respectivos, los he puesto a unos 4 metros y por fin entro el pixie.
Puedo confirmar que es vulnerable a pixie tanto por 2,4 como por 5 gh.
No se como funcionaran los dispositivos wifi ac como alfa y demas con esas antenotas, pero parece que los 5 gh son bien sordos.
Desconectado
Misterio resuelto
Desconozco tu chipset en concreto... Los realtek ac USB tienen una buena sensibilidad en banda 5Ghz, Están por los -90dBm a tasa de transmisión baja que es más o menos lo que puedes obtener con los mejores chip 2.4Ghz. Ahora, por naturaleza. las ondas 5Ghz son mas inestables y mas cortas: A sensibilidad y potencia igual sera siempre mayor la cobertura en frecuencias 2.4Ghz. Pero no hasta el punto de deber estar a cinco metros del router...
La tabla OUI devuelve Netcore
NetcoreT Netcore Technology Inc
No conozco.
Desconectado
La tabla OUI devuelve Netcore
Si, ya vi. Igual en la db de aricrack-ng lo detecta como NetcoreT Netcore Technology Inc. En una etiqueta en el router dice ser marca arcadyan
El chipset es atheros, y eso dice iw dev
[email protected]:~# iw phy#1 info
Wiphy phy1
max # scan SSIDs: 4
max scan IEs length: 2261 bytes
max # sched scan SSIDs: 0
max # match sets: 0
max # scan plans: 1
max scan plan interval: -1
max scan plan iterations: 0
Retry short limit: 7
Retry long limit: 4
Coverage class: 0 (up to 0m)
Device supports AP-side u-APSD.
Device supports T-DLS.
Available Antennas: TX 0x3 RX 0x3
Configured Antennas: TX 0x3 RX 0x3
Supported interface modes:
* IBSS
* managed
* AP
* AP/VLAN
* monitor
* mesh point
* P2P-client
* P2P-GO
* outside context of a BSS
Band 2:
Capabilities: 0x11ef
RX LDPC
HT20/HT40
SM Power Save disabled
RX HT20 SGI
RX HT40 SGI
TX STBC
RX STBC 1-stream
Max AMSDU length: 3839 bytes
DSSS/CCK HT40
Maximum RX AMPDU length 65535 bytes (exponent: 0x003)
Minimum RX AMPDU time spacing: 8 usec (0x06)
HT TX/RX MCS rate indexes supported: 0-15
Frequencies:
* 5180 MHz [36] (19.0 dBm)
* 5200 MHz [40] (19.0 dBm)
* 5220 MHz [44] (19.0 dBm)
* 5240 MHz [48] (19.0 dBm)
* 5260 MHz [52] (19.0 dBm) (radar detection)
* 5280 MHz [56] (19.0 dBm) (radar detection)
* 5300 MHz [60] (19.0 dBm) (radar detection)
* 5320 MHz [64] (19.0 dBm) (radar detection)
* 5500 MHz [100] (19.0 dBm) (radar detection)
* 5520 MHz [104] (19.0 dBm) (radar detection)
* 5540 MHz [108] (19.0 dBm) (radar detection)
* 5560 MHz [112] (19.0 dBm) (radar detection)
* 5580 MHz [116] (19.0 dBm) (radar detection)
* 5600 MHz [120] (19.0 dBm) (radar detection)
* 5620 MHz [124] (19.0 dBm) (radar detection)
* 5640 MHz [128] (19.0 dBm) (radar detection)
* 5660 MHz [132] (19.0 dBm) (radar detection)
* 5680 MHz [136] (19.0 dBm) (radar detection)
* 5700 MHz [140] (19.0 dBm) (radar detection)
* 5745 MHz [149] (19.0 dBm)
* 5765 MHz [153] (19.0 dBm)
* 5785 MHz [157] (19.0 dBm)
* 5805 MHz [161] (19.0 dBm)
* 5825 MHz [165] (19.0 dBm)
valid interface combinations:
* #{ managed } <= 2048, #{ AP, mesh point } <= 8, #{ P2P-client, P2P-GO } <= 1, #{ IBSS } <= 1,
total <= 2048, #channels <= 1, STA/AP BI must match, radar detect widths: { 20 MHz (no HT), 20 MHz, 40 MHz }
HT Capability overrides:
* MCS: ff ff ff ff ff ff ff ff ff ff
* maximum A-MSDU length
* supported channel width
* short GI for 40 MHz
* max A-MPDU length exponent
* min MPDU start spacing
[email protected]:~#
Y si se me hace extremadamente sorda. Ya hice pruebas anteriormente con los 5 ghz en casa de un amigo a unos 7 metros y una altura de distancia y nunca llego a ver el beacon. Quiza sea este router particular tl-wdr3600, de hecho en EUA lo comercializan con una tercera antena y hay mucha informacion en la red de como a;adirle 2 antenitas mas.
Desconectado
Paginas:: 1
Tema | Respuestas | Vistas | Ultimo mensaje |
---|---|---|---|
Error de inicio en entorno gráfico por Hunter310#
|
24 | 14984 | 20-06-2022 12:22:19 por kcdtv |
15 | 2712 | 10-06-2022 09:13:42 por kcdtv | |
0 | 210 | 02-06-2022 10:05:09 por kcdtv | |
TP-Link Backup Decryption Utility por kcdtv
|
0 | 200 | 31-05-2022 18:44:34 por kcdtv |
¡Aircrack-ng 1.7 ya está disponible! por kcdtv
|
1 | 514 | 13-05-2022 08:46:52 por Koala |
Ultimo usuario registrado: Asakuras
Usuarios registrados conectados: 2
Invitados conectados: 13
Número total de usuarios registrados: 2,317
Número total de temas: 1,587
Número total de mensajes: 15,137
Atom tema feed - Impulsado por FluxBB