I have been getting an error with Reaver/Inflator when I try to crack a router. When I run the attack, I can get all the way up to 90.90%, then all of a sudden it repeats the same pin and doesn't get past 90.90%. It's like it's on a constant loop. I have tried both xiaopan and backtrack 5R3. I have tried with reaver v1.4 and even downgraded to reaver 1.3. Still having the same issue. I did try to delete everything in the reaver folder and restart the attack but still no luck. Right now I'm trying reaver 1.1 and I will see the results. Anyone have any ideas? Is this a bug in reaver 1.4 as of January 6, 2014? Did my router go bad? I have cracked this router before a few months earlier and was able to without any problems. Now I cant crack anything. I've even tried some other routers to crack and getting the same issue. I am sure the signal isn't the issue because its around -46 and like I said, I was able to crack this before. I have tried re-installing all the software and drivers ( I even went to as far as reformatting my computer). When I google "reaver 1.4 90.90%", a lot of people have this same problem. Here is what I'm using and tried: -(using)Alfa awus036h (yes I made sure monitor was enabled). -(currently trying)Xiaopan 0.4.7.2 ( with reaver 1.4) -(tried) Backtrack 5R3 (reaver 1.4) -(tried) Backtrack 5R3 (reaver 1.3) -(currently trying) Backtrack 5R1 (reaver 1.1) I have looked on different forums for two weeks straight. Some people have found ways to fix it, but I've tried all of them no luck for me. The next thing I will also try is another router, but this time I will use an extended antenna and try some routers that I couldnt reach without the antenna. I ordered the antenna and it should be here this week. Also, could it be possible that this problem would have anything to do with my mac address? Should I try mac spoofing then retry and crack the router? I dont know if that will work, I just saw it on a forum that might have something to do with it lol. If anyone can help, I will be grateful. Thanks! -SoS1k.
Sorry I'm new to reaver. So the basic command I used in the first place is "reaver -i mon0 -b (BSSID) -vv". What would be the command to specify the first four digits? Also, do I do the attack, wait until it starts repeating the 90.90%, stop the attack, the resume where it left off but use the command to specify the first four digits? Thanks for responding. --- Double Post Merged, 9 Jan 2014 --- Actually just figured out how to do the specify the first for pins -p 9998, that works and starts going past 90.90%, but now it goes all the way up to 99.99% and redoes the same thing. It just repeats the same pin. Any ideas? --- Double Post Merged, 9 Jan 2014 --- Actually just figured out how to do the specify the first for pins -p 9998, that works and starts going past 90.90%, but now it goes all the way up to 99.99% and redoes the same thing. It just repeats the same pin. Any ideas?
Please enter the following table: Please edit and fill in the table and let us know the following If submitting a bug or issue report for Xiaopan and if you do not follow the correct format below your support request will be deleted! [xtable=skin2|bcenter|500x@] {tbody} {tr} {td}Description{/td} {td}90.90% Loop Issue{/td} {/tr} {tr} {td}Chipset{/td} {td} RTL8187L{/td} {/tr} {tr} {td}MAC Address{/td} {td} BE:3E:89 {/td} {/tr} {tr} {td}Brand{/td} {td}Alfa awus036h{/td} {/tr} {tr} {td}Adapter Type{/td} {td}External USB with antenna.{/td} {/tr} {tr} {td}Xiaopan Version{/td} {td} 0.4.7.2{/td} {/tr} {tr} {td}Other versions tried{/td} {td}Only tried current version {/td} {/tr} {tr} {td}Injection Test{/td} {td} Reaver/Inflator{/td} {/tr} {tr} {td}Method of Running{/td} {td}VMworkstation{/td} {/tr} {tr} {td}Problems & Notes{/td} {td} Repeating same pin at 90.90% with reaver v1.4{/td} {/tr} {tr} {td}Steps to Reproduce{/td} {td}To reproduce the problem, I kept trying the same router. Also tried other routers. {/td} {/tr} {tr} {td}What have you attempted{/td} {td}I've tried specifying the first four pins (got past 90.90% but then started the same issue but at 99.99%). Downgraded to reaver v1.3. Still no help. I'm close to the router. The router has a -40 signal.{/td} {/tr} {tr} {td}Is this card compatible{/td} {td}Yes. I have cracked this router a few months earlier.{/td} {/tr} {/tbody} [/xtable] Could it possibly be my adapter I'm using? Do you think it went bad? My adapter can still go into monitor mode and still see the BSSID of other routers. I've heard something about trying to crack a router then some routers will automatically block the attack for 24 hours or more. Could that be the issue? I have been trying everyday. Downgrading reaver from v1.4 to v1.3 didnt help and neither did specifying the first four pins (I dont even think the first four pins are correct anyway).
omg! we have the same problem mate. im using xiaopan 4.7.2 and when i start to crack a PLDTMYDSL it always start to 90.90% and goes nothing! but when i try to crack other router sometimes it start to 0.00% but mosly it always start to 90.90% is this a bug of xiaopan 4.7.2??
Have you tried PLDTWIFI "all upper case" plus the last 5 digits of the mac address, use to work on their business routers. for the wpa key
yes but no luck for me! the default password has been changed.. im using vmware for xiaopan 4.7.2 and when i start to crack it always start to 90.90% and stuck to 99.99% can anyone help me?
Nash aquino, When you start at 90.90% and get stuck at 99.99%, I assume you are putting in the first four digits? Because I am having the same issue IF I specify the first four digits. I don't have that problem trying to crack a router if I'm just starting from scratch (meaning I start all over). I also have this issue not using PLDTMYDSL... When I do start all over and get all the way up to 90.90% and starts looping, my pin number is (cant exactly remember off the top of my head) 99985677. I don't believe the first four pins are "9998" because I'm having the same issue with different routers. What I did notice is that if you try to crack a router starting all over, the numbers "567" were not changing when reaver was trying different pins. Example: (Reaver will try different pins) 12345670, 00005670, 11115677, 11115673, etc, etc. This would go on an on without the numbers "567" ever changing. Is anyone getting the same issue? This does not make sense to me why all of a sudden I (and many others I found on google) are having the same issue with the 90.90% loop? Months ago I used the same version of everything (Reaver v1.4, vmware, backtrack5, xiaopan 4.7.2, same wireless card, never updated anything). Since I did try Backtrack 5 R3, Backtrack 5 R2, Backtrack 5 R1, Xiaopan 4.7.2., I really thinking the issue is Reaver (I have tried Reaver v1.3 and still no use). Which really makes me confused because I never updated reaver with since I was last able to crack a router, but that's the only thing I can think of. (Yes, I did try updating the latest svn trunk in reaver 1.4, sitll no good). Anyone have any clues???
I already tried downgraded to Reaver v1.3. Still nothing. I've also downgraded to Reaver v1.3 and updated everything. Still no use.
Updated firmware on attack APs. Try Code: Select All --ignore-locks Do not use -L, see post #38 Issue 83 - reaver-wps - Keeps trying the same pin - Brute force attack against Wifi Protected Setup - Google Project Hosting
I don't use the -L command. My basic command is "reaver -i mon0 -b XX:XX:XX:XX:XX -vv". How do I update the firmware on the attack APs? I have never tried the --ignore -locks command. I will see how it goes and let you know. I have also looked at post #38 on issue 83 and tried it. That DOES get me past the 90.90% loop, but then it gets all the way up to 99.99% and starts looping again. No help. post #38 on issue 83 tells me to replace the two zeros with one's in the file that tries the pins. I don't see how editing those pins would find the ACTUAL correct pin number. Anyways, like I said, I tried it anyways but still no luck. I also did end up buying a new wireless card (that's different from my other one and can enable monitor mode), but I still get the same issue. I have ruled out the following that could cause the problem: -Wireless card -Reaver 1.3 -Reaver 1.4 -Xiaopan -Backtrack 5 R3, Backtrack 5 R2 -Updating to latest SVN trunk -Trying a different router to crack -Being to far away from the router (i'm -50) I'll give the --ignore-locks a try and see how it goes. And if you could let me know how to update the firmware on the attack APs, I'll try it and let you know. Thanks. --- Double Post Merged, 30 Jan 2014 --- I don't use the -L command. My basic command is "reaver -i mon0 -b XX:XX:XX:XX:XX -vv". How do I update the firmware on the attack APs? I have never tried the --ignore -locks command. I will see how it goes and let you know. I have also looked at post #38 on issue 83 and tried it. That DOES get me past the 90.90% loop, but then it gets all the way up to 99.99% and starts looping again. No help. post #38 on issue 83 tells me to replace the two zeros with one's in the file that tries the pins. I don't see how editing those pins would find the ACTUAL correct pin number. Anyways, like I said, I tried it anyways but still no luck. I also did end up buying a new wireless card (that's different from my other one and can enable monitor mode), but I still get the same issue. I have ruled out the following that could cause the problem: -Wireless card -Reaver 1.3 -Reaver 1.4 -Xiaopan -Backtrack 5 R3, Backtrack 5 R2 -Updating to latest SVN trunk -Trying a different router to crack -Being to far away from the router (i'm -50) I'll give the --ignore-locks a try and see how it goes. And if you could let me know how to update the firmware on the attack APs, I'll try it and let you know. Thanks. --- Double Post Merged, 31 Jan 2014 --- Tried the --ignore-locks. Still Not working. I'll guess I'll just have to wait and see if anyone has fixed this before.
Without more info we could only guess,try with -vv at the end of your command and the brand of router etc. Also paste your commands save's us guessing.