По МГТС (страпон), не проскакивала инфа в базе (засрали твари весь эфир), в подъезде провели кабель канал (проснулись через 7 лет), очередной распил бюджетных средств, вся оптика на соплях. Просканировать локалку не могу из-за отсутствия доступа к AP с хорошим сигналом (была одна на примете, да модернизировали на более современную 2ух диапазонную модель), доступ пропал: MGTS_GPON_7AD5 (E4:26:86:A3:10:20) [X] RalinkAPS MGTS_GPON_A5FD (E4:26:868:65:28) [X] RalinkAPS MGTS_GPON_4495 (B4:A5:EF:BB:0B:79) BroadcomAP MGTS_GPON_0798 (94:4A:0C:AC:86:47) BroadcomAP A1eNsHOME (70:9F:2D:CD:15:76) MGTS_GPON_6DD4 (E4:77:23:F1:98:5E) onu zte onu EV-2012 RT-WiFi-6E80 (10:A3:B8:3A:6E:81) RalinkAPS Ralink RT2860 MGTS_GPON_F5E2 (F4:B8:A7E:6B:CD) ZTE F660 ZTE MGTS_GPON_9297 (3C:98:72:BF:6A:F2) BroadcomAP Broadcom
Hi all, For this one, do you know the wps pin or default wireless password : BSSID: DC:F8:B9:F4:5D:91 SSID : DIGI_f45d91 model : ZTE F660 And : 50: 78: B3: A7: 52: 85 DIGI-5-5284 model : ZTE ZXHN GateWay V1.0 Regards!
Do you know what does it mean this : [*] Audit started at 2020.09.09 22:45:18 (UTC+02:00). [*] Associating with AP... [+] Associated with DC:F8:B9:F4:5D:91 (ESSID: DIGI_f45d91). [*] Trying pin "12345670"... [*] Sending EAPOL Start... [*] Received Identity Request. [*] Sending Identity Response... [*] Received WPS Message M1. [*] E-Nonce: 8E689F9B9C4B51CDA6AF065ED6F30D4D [*] PKE: 7AF0AE29288A51EF295155EF8A5E7E94E62628B9A2348E99BCA00B31329E9EAE6ED19B89879E397368D113A0121D043EA74A7D0779C9B368F8ADE2578EF37B4D40184C387020D8D2A058C96FE978B56A87D270255414F268342032F1AFC75DF231FFADC8F5EA07F41212E048ABA9EFA6B0E00F83F305938812FC3AA2C61551F27CA01ACAEEDFE32D1FF0B9E127F065F5F1B71B139756A857CF81FFC45F2683EF0C6905F0CDD6771A8DB6D0EFDD4E562940114B5B7A6E9F3FBBC1E21847B3994D [*] Manufacturer: ZTE [*] Model Name: ZTE [*] Model Number: 123456 [*] Serial Number: 1234 [*] Device Name: ZTE F660 [*] Sending WPS Message M2... [*] PKR: 000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002 [*] AuthKey: 6245554E90DD792D06A4C80B7DB7590599A0F625DFA4027FF37C6303010C539B [*] EAP session closed. [*] Trying pin "12345670"... [*] Sending EAPOL Start... [*] Received Identity Request. [*] Sending Identity Response... [*] Received WPS Message M1. [*] E-Nonce: F934D63E2DF9C953193491B2E235600D [*] PKE: 7AF0AE29288A51EF295155EF8A5E7E94E62628B9A2348E99BCA00B31329E9EAE6ED19B89879E397368D113A0121D043EA74A7D0779C9B368F8ADE2578EF37B4D40184C387020D8D2A058C96FE978B56A87D270255414F268342032F1AFC75DF231FFADC8F5EA07F41212E048ABA9EFA6B0E00F83F305938812FC3AA2C61551F27CA01ACAEEDFE32D1FF0B9E127F065F5F1B71B139756A857CF81FFC45F2683EF0C6905F0CDD6771A8DB6D0EFDD4E562940114B5B7A6E9F3FBBC1E21847B3994D [*] Sending WPS Message M2... [*] PKR: 000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002 [*] AuthKey: 0474E94E324B873BD0C037FEF16B9482CBAC80F46D8BA8B83217432D5CE55BB8 [*] EAP session closed. [*] Trying pin "12345670"... [*] Sending EAPOL Start... [*] Received Identity Request. [*] Sending Identity Response... [*] Received WPS Message M1. [*] E-Nonce: 16792BC300CAE3B6889E6F68C679FE04 [*] PKE: 7AF0AE29288A51EF295155EF8A5E7E94E62628B9A2348E99BCA00B31329E9EAE6ED19B89879E397368D113A0121D043EA74A7D0779C9B368F8ADE2578EF37B4D40184C387020D8D2A058C96FE978B56A87D270255414F268342032F1AFC75DF231FFADC8F5EA07F41212E048ABA9EFA6B0E00F83F305938812FC3AA2C61551F27CA01ACAEEDFE32D1FF0B9E127F065F5F1B71B139756A857CF81FFC45F2683EF0C6905F0CDD6771A8DB6D0EFDD4E562940114B5B7A6E9F3FBBC1E21847B3994D [*] Sending WPS Message M2... [*] PKR: 000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002 [*] AuthKey: A275B1488D98816FDBFAEFB110934E42E584869897322E30EE4AD94AD9D049CC [*] Trying pin "12345670"... [*] Sending EAPOL Start... [*] Received Identity Request. [*] Audit stopped at 2020.09.09 22:45:37 (UTC+02:00). I see a lot of this : [*] EAP session closed.
@lex101 пароли не найдены. Пин-коды WPS: Имя: ASUS PIN PIN: 44197018 Вероятность: 86% Скорее всего, уязвим к Pixie Dust Linux: OneShot, Reaver, Bully Windows: Router Scan Android: WPSApp, WPS WPA Tester, OneShot
For this one : Channel: 5 (2.4 GHz) BSSID: 80:8C:97:75:0B:62 ESSID: Ap. 140 Security type: WPA2 Signal Level: -29 dBm WPS: version 2.0, configured WSC Name: KAON Wireless AP Device Model: Realtek RTL8xxx EV-2010-09-20 Serial Number: 123456789012347 I have tried with pixie wps attack but i did not get any pin Thanks!
Hi, For this one also : Channel: 5 (2.4 GHz) BSSID: 00:AD:24:57:A8:E0 ESSID: dlink-A8E0 Security type: WPA/WPA2 Signal Level: -79 dBm WPS: version 2.0, configured, locked WSC Name: DIR-842 Device Model: D-Link Router DIR-842 Serial Number: 00000000 Thanks!
Try mdk4 for a denial-of-service attack using the following modes: "Authentication DoS" and "EAPOL Start and Logoff Packet Injection" to reboot the device. But note that this is probably will not work if your DIR-842 router has revision C1 or higher.