We have had reports of this in previous builds @Remington. If it is in wlan0 when it is supposed to be mon0 it will find no APs.
I never had this problem in previous builds. Any way of getting it in mon0? I think more beta testing should have been done before this was released.
Try to put your card in monitor mode manually Code: Select All airmon-ng start wlan0 I'm not a RTL8187L owner , so i can't do my testing with this card/driver. (but i tested it with my NHA, AR9285 and RT3070) on 0.4.7+ building/testing nobody reported issues with that chipset, so this issue was unexpected Maybe you can help us on beta testing for future releases
I would think the most popular card (8187L) would have been tested Anyway tried this and still got this . And Bully just stays looking like this
Try remove rtl8187l_ieee80211 from you onboot.lst If you can't edit your onboot.lst "booting from iso" press tab on startup and add blacklist=ieee80211_rtl blacklist=r8187 blacklist=ieee80211_crypt_rtl to your boot codes.
BullyWPS1.7 --- Double Post Merged, 13 Sep 2013, Original Post Date: 13 Sep 2013 --- also has implemented the change of mac and mac to the original Reset --- Double Post Merged, 13 Sep 2013 ---
hi cristi_28 is it posible to automatically save work sessions!? when stop the application and start again to start where she stoped not starting from beginning ?
bully save automatically work sesions in ./bully if you run the script you gave a mesage with the sesion save when you stop bully automatically save work sessions --- Double Post Merged, 13 Sep 2013, Original Post Date: 13 Sep 2013 --- wen you restart with the same target bully restore with the last pin
Bully should resume with the -w sessions are saved in ~/.bully/ so can easily be implemented. Also bully has been updated "as of yesterday" with -B, --bruteforce which can speed up attack. I'll post a update if needed.
Thanks! I got Bully working by typing the blacklist stuff in but it just repeats the same pin for all the networks. How do you type in Attack Commands like Reaver?
@Fantasma can you please package this with BullyWPS GUI 1.7 and the monitor mode issue fix? Sent from my GT-N7000 using Tapatalk 4
Fantasma Here is the updated bully with -B, --bruteforce option. Bruteforce the WPS pin checksum digit rather than calculating it according to the WPS specification. Some AP's use a non-compliant checksum in an attempt to evade attacks from compliant software. Use of this option can result in a ten-fold increase in the time it takes to discover the second portion of the pin, and should only be used when necessary.
Thanks dude,I will try with this file I tried the precompiled binary bully.2013-09-11 and got a "libpcap.0.0.8.tcz error" (can't remember what exactly say)
I think libpcap should be fine you might need openssl 0.8 though ? i'll have to check. Works fine here i try to avoid pre built bins just build from source.