Mr. Penguin updated Dumpper + JumpStart with a new update entry: New Update and New Default Pins Read the rest of this update entry... --- Double Post Merged, 13 Dec 2014 --- Where is this in 60.9? Thanks
Tried this prog, but it doesnt seem to work after trying to connect for 5 mins, i tried 5-6 diffrent wifi connections. Maybe someone got an idea, does the latest version 60.9 work for you people?
anyone know what version dumpper that can penetrate the WPS on the router ZTE-8918 ??? if there is give linknnya. because dumpper now can not penetrate ZTE router
Hi.. and hpy nw yr by the way xD The Idioma.ini file must be edited manually and replace the content of their language, now everyone can translate to any language cheers
i can penetrate the ZTE router.run ! but not finish to pentest the ZTE router,it just cracked some router,like TP-link,and Ralink please if are there have any solution
I really hope you can help me... I'm pretty lost. First off, this forum doesn't seem to put posts in chronological order which makes it VERY difficult to figure out what the most up-to-date information is. In regards to Dumpper specifically, the English version you provided doesn't seem to work the same as 60.9 (the latest build). In 60.9 I get a couple networks with "red" indicators in the WPS tab, but the default pin doesn't work and I can't access a dropdown list to select other pins. Additionally, not all of the networks I scan for show up in the WPS tab, despite the fact that I've confirmed via CommView that they have compatible security protocols. Despite all of the tutorials, videos, etc. that I've checked out none of it seems to align with what I actually have going on. I'm getting very frustrated - I'm not some n00b who needs their hand held and routinely cracked WEP networks a few years ago, but I'm getting so much conflicting and incomplete information when trying to use Dumpper that it's making my head spin.
Mr. Penguin updated Dumpper + JumpStart with a new update entry: New Networks! Read the rest of this update entry...
This doesn't work for me at all. I'm using Alfa awus036h [RTL8187]. It detects network but shows wrong pins and when i try to jump start it.. It starts connecting to the network. But never quite connect to it. And yes i've all the tools installed.. .Netframework 4.5, Winpcap, Jump-start. And the router that i'm trying to penetrate is my own with default WPS on... Could someone help me out on this? I'm also attaching some pictures.
Hey Khan, As far as I can tell this whole thing is somehow a SCAM. Nobody on the whole internet seems to be willing or able to provide any actual support or useful information, nothing seems to work the way it's described, all of the people that I've contacted who claimed success don't respond to any inquiries, and even the files themselves that are downloaded don't match up with the description of what they should be. All of the tutorials on various sites are copy/pasted. The biggest indicator that this wasn't legit is the broken English, yet like damned fools the promise of network hacking interfered with our better judgment. Live and learn, I guess... the elaborate nature of this ruse is certainly remarkable. My best advice is to uninstall the software, run a few different antivirus programs, use autoruns to find and remove any startup entries, do a system restore to before you installed, and monitor your network traffic for unknown/unusual activity/connections. I did this and didn't come up with anything, but your mileage may vary. Please report any unusual findings back here so we can begin to establish a knowledge base about whatever is going on.
Mr. Penguin updated Dumpper + JumpStart with a new update entry: Minor Bug Fixes Read the rest of this update entry...
It gets download 15,000 times a week and it is very successful in Spain and Portugal. If you are in another country your success will be less. @SkyWatcher is the author, so maybe he can comment. https://www.youtube.com/watch?v=pDXg0P9eRWU The Pins are derived from default algos and they have been calculated to be correct using a wide variety of known exploits. Obviously this will not work if someone has changed the default PIN or WPA/2 password. Some of which are listed in RouterPwn. This isn't going to crack every network people!
The amount of times it gets downloaded has NOTHING to do with how legit the software actually is. Again, NOBODY ACTUALLY PROVIDES PRACTICAL, WORKING SUPPORT FOR THIS SOFTWARE. Not even the author. Highly suspicious. Funny how me calling it scamware gets a prompt reply but my previous post asking for help and the personal messages I sent you go totally unanswered. Highly suspicious. Having a youtube video does NOT make this software legit either. Easy enough to fake this kind of thing. [/quote]The Pins are derived from default algos and they have been calculated to be correct using a wide variety of known exploits. Obviously this will not work if someone has changed the default PIN or WPA/2 password.[/quote] If people don't change the default password then this program won't work? Really? Because there IS NO DEFAULT WPA/2 PASSWORD. You literally have to set one from the router settings page. As far as changing the PIN... that can't be done. It's why it's printed on the router itself. ... Another shady thing with no support. No surprise. It won't even crack ANY of the 8 networks I have access to. Including the three separate routers I set up with defaults (two Netgears and a Belkin) SPECIFICALLY for testing this program.
They make no money off this and develop in their spare time. You expect them to provide support for something that only one person actively develops? You cannot call this app a scam, because it is does more than just cracking. It displays information about the current networks which I am sure you can admit to. You have to remember that vendors are ramping up security on their routers. New models / firmwares do not work. I do not offer personal support via personal messages. But contact @SkyWatcher on his wall, pm or tag him in this thread. For those who want a tutorial: http://www.reddit.com/r/hacking/comments/2mt3wr/step_by_step_guide_to_using_winpcap_dumpper_and/ Netgear and Belkin have a riduculous amount of models. What are the ESSID and SSIDs? Also note that you are unlikely to connect to networks with more than -70 RSSI Go wardriving, scan and attempt to crack 40 networks then get back to us TP_Link has been actively trying to patch the security flaw with new firmware. This list was active since 8/3/2013 Vulnerable Devices TL-W8151N (V1, V3) TL-WA730RE (V1, V2*) TL-WA830RE (V1, V2*) TL-WDR3500 TL-WDR3600 TL-WDR4300 TL-WR720N TL-WR740N (V1, V2, V3, V4) TL-WR741ND (V1, V2, V3*,V4) TL-WR841N (V1*,V5, V7, V8) TL-WR841ND (V3, V5, V7, V8*) TL-WR842ND TL-WR940N (V1, V2) TL-WR941ND (V2, V3, V4, V5) TL-WR1043N TL-WR1043ND TD-VG3511 (V1*) TD-VG3631 TD-W8901N TD-W8950ND TD-W8951NB (V3*,V4, V5) TD-W8951ND (V1, V3, V4, V5) TD-W8960N (V1, V3, V4) TD-W8961NB (V1, V2, V3*) TD-W8961ND TD-W8968 TD-W8970 *Probable but not confirmed
Plenty of router's have the option to change the default pin my belkin wifi setup page http://www.belkin.com/Pyramid/AdvancedInfo/F6D4230-4/Interfaces/F6D4230-4v1/En/wls_wps.html And your using windows to test your network? I think this software may have worked before vendors updated fixed firmware but that time has long passed.As for scamware i doubt we would have heard before now, anyone with any sense would scan any downloads before installing I'd suggest using a os like kali or xiaopan and use reaver/ bully either through vm or live usb to test, if your looking for a windows option i think you will be out of luck, windows is just poor for this type of thing
I completely agree with you on that. (Y) But my pin is default. And i've tried this with 3 Cards and several routers. still the same outcome. All routers are having default pins and tried it using ALFA, TP-Link, MT-link adapters.. And about firmware update.. My router is 2 years old.. never updated it or anything.. its on stock firmware. So how come dumpper doesn't work?
Don't get me wrong - I use backtrack/aircrack/commview/reaver for most pentesting. Doing this stuff via Windows is mostly just proof of concept. Also, went wardriving for 8 hours today on Mr.Penguin's recommendation. Traveled (round trip) 186 miles in increasing sized concentric circles around Madison and Milwaukee, Wisconsin. being a rather technologically-backwoods state I figure this would come up with SOMETHING. I encountered 178 unsecured networks, and just shy of a thousand secured networks of all security protocols - NONE of which were crackable via dumpper+jumpstart. If this IS legit software, then the only logical explanation I can think of is that Spain has literally no awareness of what the concept of information security actually means.
Few confirmed reports on FB saying it works https://www.facebook.com/xiaopanos/photos/a.375340815845522.85555.375326039180333/857069197672679/ Quotes UK and Spain work well