Reaver vs Netgear DGN2200

The guys from Tactical Network Solutions released an open source project called reaver that implements an attack on WPA http://code.google.com/p/reaver-wps/ using WPS.

“Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as described in http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf

I tested this against my home router a Netgear DGN2200 using my eee-pc with an Atheros wireless chipset and the FOSS ath5k driver.

Target: Netgear DGN220

After tweaking the command line parameters a bit, I managed to crack the password in 7 hours 45 minutes.

Cracked in 7 hours 45 minutes later

 Lessons learnt:

1. It is all about hardware / drivers – tried using other hardware – about three times slower using HP laptop with Intel chipset
2. Tweaking the command line helps a lot, in this case the delay between attempts and the way it handles AP lock outs

Next step

The WPS feature can be disabled in the Netgear control panel  – I disabled WPS and am running reaver against it again

 Update

Netgear FAIL – when you turn-off the WPS pin, it only slows down the brute force attack, but does not prevent it.  It took 30 hours to crack.

Netgear FAIL

The guys from Tactical Network Solutions released an open source project called reaver that implements an attack on WPA http://code.google.com/p/reaver-wps/ using WPS. “Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as described in http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf” I tested this against my home router a Netgear DGN2200…

2 Comments

  1. Hi,

    Do you mind sharing what tweaks you used in order to make reaver work?

    Have you ever ran across an issue where it was getting stuck at ‘Sending EAPOL START request’ and timing out?

    Cheers,
    m

Leave a Reply