From owner-freebsd-chat@freebsd.org Mon Mar 19 07:11:35 2018 Return-Path: Delivered-To: freebsd-chat@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 52C40F56433 for ; Mon, 19 Mar 2018 07:11:35 +0000 (UTC) (envelope-from tdteoenming@gmail.com) Received: from mail-yw0-x231.google.com (mail-yw0-x231.google.com [IPv6:2607:f8b0:4002:c05::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id E2A7D7F7CA for ; Mon, 19 Mar 2018 07:11:34 +0000 (UTC) (envelope-from tdteoenming@gmail.com) Received: by mail-yw0-x231.google.com with SMTP id v68so8297861ywg.13 for ; Mon, 19 Mar 2018 00:11:34 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to:cc; bh=3/sDZDUoLKVu5ZLuE+bBRNLKTnEKKvtcf9kxi64rbcc=; b=lO8aB6OlmUUM75Zmx+MvMONcsf7U/wgH2vxo3D6xF5viY+OPdYbQpuPd58kDWMwNc+ zXWlJfaFTDETqlvaxRX6icFsCBDpm4SXdC9CyObokj2bZeVAnvva7THJHait3MuQVQSr FIt85KvU6fJkM5vkI477NPItDp6TKuNimUCeGgtzb8dl2Ygz6J48dLCvYRXyhVp+kjYn IQG9xSE+chb3+7Q4EBE+/u5oyK7g9ebdFXHvD6PBSBswD/1UlRR9ECg0o/bO4vBqobFC JIvv6gl08yGw3Q1RdJsrBn8STbi64VJtQzqcbILjsDQzNBcgi3VK8pmHZTHfecTRWwL0 Lcfg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to:cc; bh=3/sDZDUoLKVu5ZLuE+bBRNLKTnEKKvtcf9kxi64rbcc=; b=sYkWcCioEBDINUcdFmOnRKxni7/myGkmdC6rZ5M6KDmWtgt75DQcxA9ARDwlWfPD6J VvkPg7w7AohzCPFtA9nXIJhFSvmtb3RzvLKeaogW4pprfziMi57x3rKyGkC+Xh7gHBno 2ydvL2L9NSHnQnuCmkLdTTRpqbgGza8D54xDM6WtSdijvER5RPYW8I9QkW8M91ZDnsmE LLn62xzwhBsUHxgAk4nQ/ucFlmydhyvNsV6kymrETN0PFeF47cAK+y5O+aPoSxTV7cyC /47QEzsA+Md3WfiRne91SgmSA3YRjVed91PperfpqleTYGJpFqOsZWUvRkm4l5rrEI/h TceA== X-Gm-Message-State: AElRT7G9GbzsmneuvSyJRaUId+Zux8Z3/Xg9mE6MLMMOX5yBRyoIsaXN iuacTQ9gf6av0QEeu7vrWAeAyWXKC2w7vW+JFFIY X-Google-Smtp-Source: AG47ELs9K6fUWDs9DhQvauvNNS7GKvM2bmfzyxHI35Q66BjFOsmqm36uzTe2mWFyA9ILwzPgcw/qGkypRBVHlCX4/sU= X-Received: by 10.129.115.67 with SMTP id o64mr6076724ywc.225.1521443494139; Mon, 19 Mar 2018 00:11:34 -0700 (PDT) MIME-Version: 1.0 Received: by 10.13.235.200 with HTTP; Mon, 19 Mar 2018 00:11:33 -0700 (PDT) From: Turritopsis Dohrnii Teo En Ming Date: Mon, 19 Mar 2018 15:11:33 +0800 Message-ID: Subject: [LEARNING OUTCOME] Wi-Fi WPA Hacking Tool is Totally Useless on New Wireless Routers To: freebsd-chat@freebsd.org Cc: Turritopsis Dohrnii Teo En Ming Content-Type: text/plain; charset="UTF-8" X-BeenThere: freebsd-chat@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Non technical items related to the community List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 19 Mar 2018 07:11:35 -0000 Hi, I am sharing my learning outcomes. Recently I downloaded Kali Linux 64-bit Version 2018.1 and ran it on my HP laptop with the integrated Intel Dual Band Wireless-AC 8260 Wireless Network Card. I wanted to test if I could hack the Wi-Fi WPA password on Ruckus R700 Access Point (AP) and the Aztech DSL8900GR(AC) Wireless Router. So I started using the Reaver WPA cracking tool. I understand that the Reaver tool works because there is a bug with Wi-Fi Protected Setup (WPS). I have no luck with Reaver on the Ruckus R700 Access Point. After running Reaver, I found out that WPS is permanently disabled on the Ruckus R700 AP with no option to turn it back on at all. Hence It is not possible to hack the WPA password on Ruckus R700 AP. Understanding that I couldn't do anything further with Ruckus R700 AP, I proceeded to test Reaver on the Aztech DSL8900GR(AC) wireless router. In this case, I also found out that WPS is disabled by default on the Aztech wireless router. Reaver will not be useful at all if WPS is disabled. But there is an option to enable WPS. So I enabled WPS in the Aztech wireless router configuration page. And continued testing with Reaver. But because Aztech wireless router has the rate limiting security feature, brute force password attacks will be very slow and probably take forever. The rate limiting security feature on the Aztech wireless router is meant to slow you down when you are brute forcing the WPS pin. So here is my conclusion: Reaver Wi-Fi WPA hacking tool is totally useless on new wireless routers which have the WPS disabled or have implemented a fix for the WPS bug. Are there any other WPA cracking tools which I can use in my educational learning journey? Please advise. Mr. Turritopsis Dohrnii Teo En Ming Singapore 13 March 2018 Tuesday 4:28 PM Singapore Time ===BEGIN SIGNATURE=== Turritopsis Dohrnii Teo En Ming's Academic Qualifications as at 30 Oct 2017 [1] https://tdtemcerts.wordpress.com/ [2] http://tdtemcerts.blogspot.sg/ [3] https://www.scribd.com/user/270125049/Teo-En-Ming ===END SIGNATURE===