From owner-freebsd-amd64@freebsd.org Mon Mar 19 07:14:04 2018 Return-Path: Delivered-To: freebsd-amd64@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id C4ADFF5676D for ; Mon, 19 Mar 2018 07:14:03 +0000 (UTC) (envelope-from tdteoenming@gmail.com) Received: from mail-yw0-x232.google.com (mail-yw0-x232.google.com [IPv6:2607:f8b0:4002:c05::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 47D3F7F930 for ; Mon, 19 Mar 2018 07:14:03 +0000 (UTC) (envelope-from tdteoenming@gmail.com) Received: by mail-yw0-x232.google.com with SMTP id z82so7894973ywd.9 for ; Mon, 19 Mar 2018 00:14:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to:cc; bh=3/sDZDUoLKVu5ZLuE+bBRNLKTnEKKvtcf9kxi64rbcc=; b=LPTR251+YlgduIaZGlVsW6Li98RYGpj+OXNtHLHBhIDKQKr4CtfNHrh3z/xxGdCl0v UHaRTEaNLqy0I3oQjPDosFKybNDfPAsbh7OTKw1T+geZ6xU53QCH2OJn1nY4FPQGjfMS GaPhzolbfQwPmrSP4VwfJrtH9PRqh7lG9IVLPemeGyYd/X5LSWD10Cno/9nMJK9UewJN a1ktLY4PqbkW6wG0qlHuveJa+FnEeIMFCaD+S4zRiJzZKoBk2Pf3JaVDx5by30vGXKGY yWf4KdufT+sCI/BQtgmgKQStWVUUJVr0cBOUOuogaBLIdki6Tr5pvvs9j6cdn2WKQzUa LfNA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to:cc; bh=3/sDZDUoLKVu5ZLuE+bBRNLKTnEKKvtcf9kxi64rbcc=; b=PHZppoZB8h4dwcJfVThfV6urs1yF80iYj+SNqME8VCgF/W9XJEXB+fukwhq34UEDDD tQMYNkSey/J4S4ZiikiGn9xE6TtsuH9nOsUvPp2QCr5qX/I2PqZS8IzB5YRloISiprlh R9kV3WHTZcDLHtUb08Cymg7/L8CjpRHV5C1+Xf/D0pmP5T+3ffxFeJancO1qBysVvgF8 wzuLpVuRCVS0i4aTW/ibZnyWvPSoafQxCWpGh+MJjkqJA5B2FVPPiundynQ2HEtH8Ffs SQEZyu4VzDu4mBJl9z9F3KyMbhq1GS0QXUTawIalReKZp0AHTEG8/uFRn2yJ4/9eGnxu 2Olw== X-Gm-Message-State: AElRT7HATW7TbKuqQx93rHRbQB1RhcSUm13h7nfTXvTAkfZznY7OHrnl hGMYWpxgjk6IPAlPrTQqdt0hhIhPz23e//CJWX1T X-Google-Smtp-Source: AG47ELsLVL1rFebgMbPjX8zaensVtIdMQzf+aMHc/g6VvL5igeg9jJmHgjhe3CF+spRjm80HluSidap7oqreR9Jzuqc= X-Received: by 10.129.162.84 with SMTP id z81mr5926625ywg.377.1521443642564; Mon, 19 Mar 2018 00:14:02 -0700 (PDT) MIME-Version: 1.0 Received: by 10.13.235.200 with HTTP; Mon, 19 Mar 2018 00:14:02 -0700 (PDT) From: Turritopsis Dohrnii Teo En Ming Date: Mon, 19 Mar 2018 15:14:02 +0800 Message-ID: Subject: [LEARNING OUTCOME] Wi-Fi WPA Hacking Tool is Totally Useless on New Wireless Routers To: freebsd-amd64@freebsd.org Content-Type: text/plain; charset="UTF-8" X-BeenThere: freebsd-amd64@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Porting FreeBSD to the AMD64 platform List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 19 Mar 2018 07:14:04 -0000 Hi, I am sharing my learning outcomes. Recently I downloaded Kali Linux 64-bit Version 2018.1 and ran it on my HP laptop with the integrated Intel Dual Band Wireless-AC 8260 Wireless Network Card. I wanted to test if I could hack the Wi-Fi WPA password on Ruckus R700 Access Point (AP) and the Aztech DSL8900GR(AC) Wireless Router. So I started using the Reaver WPA cracking tool. I understand that the Reaver tool works because there is a bug with Wi-Fi Protected Setup (WPS). I have no luck with Reaver on the Ruckus R700 Access Point. After running Reaver, I found out that WPS is permanently disabled on the Ruckus R700 AP with no option to turn it back on at all. Hence It is not possible to hack the WPA password on Ruckus R700 AP. Understanding that I couldn't do anything further with Ruckus R700 AP, I proceeded to test Reaver on the Aztech DSL8900GR(AC) wireless router. In this case, I also found out that WPS is disabled by default on the Aztech wireless router. Reaver will not be useful at all if WPS is disabled. But there is an option to enable WPS. So I enabled WPS in the Aztech wireless router configuration page. And continued testing with Reaver. But because Aztech wireless router has the rate limiting security feature, brute force password attacks will be very slow and probably take forever. The rate limiting security feature on the Aztech wireless router is meant to slow you down when you are brute forcing the WPS pin. So here is my conclusion: Reaver Wi-Fi WPA hacking tool is totally useless on new wireless routers which have the WPS disabled or have implemented a fix for the WPS bug. Are there any other WPA cracking tools which I can use in my educational learning journey? Please advise. Mr. Turritopsis Dohrnii Teo En Ming Singapore 13 March 2018 Tuesday 4:28 PM Singapore Time ===BEGIN SIGNATURE=== Turritopsis Dohrnii Teo En Ming's Academic Qualifications as at 30 Oct 2017 [1] https://tdtemcerts.wordpress.com/ [2] http://tdtemcerts.blogspot.sg/ [3] https://www.scribd.com/user/270125049/Teo-En-Ming ===END SIGNATURE===