That's a fairly significant finding.  Can anyone else confirm the existence
of devices that still fall to Reaver even when WPS is disabled?

Chris, when you run:

iw scan wlan0 | grep “Config methods”

Do you see a difference in advertised methods?

On Mon, Feb 13, 2012 at 3:58 PM, chris nelson <sleekmountain...@gmail.com>wrote:

> i have tested reaver on a netgear and linksys (dont have model nos. with
> me) with wps disabled and enabled. the wps setting did not matter and both
> were vulnerable. was able to recover wpa2 passphrase in ~4 hrs on both.
>
>
>
>
> On Mon, Feb 13, 2012 at 8:32 AM, Dan Kaminsky <d...@doxpara.com> wrote:
>
>> Steve while he's often derided goes into this very well.  Many cisco's
>>> only stop advertising wps when it is "off" but wps actually still
>>> exists...which means they are still easily hackable.
>>>
>>
>> Have you directly confirmed a WPS exchange can occur even on devices that
>> aren't advertising support?  That would indeed be a quick and dirty way to
>> "turn the feature off".
>>
>>
>>
>> _______________________________________________
>> Full-Disclosure - We believe in it.
>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>> Hosted and sponsored by Secunia - http://secunia.com/
>>
>
>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to