Well, what this all tells me is that my process of simply checking for advertised configuration methods understates the number of nodes actually vulnerable. Reaver should be modifiable into an active scanner, at least.
On Mon, Feb 13, 2012 at 7:09 PM, Ian Hayes <[email protected]> wrote: > On Mon, Feb 13, 2012 at 1:57 PM, Dan Kaminsky <[email protected]> wrote: > > That's a fairly significant finding. Can anyone else confirm the > existence > > of devices that still fall to Reaver even when WPS is disabled? > > The Netgear N750 definitely does. I can rummage through my Box'o'Stuff > and see if I have any more wireless APs... > > It looks like the Belkin routers don't. After disabling WPS, reaver > just hung after hitting the channel the AP was on. Re-enabling, reaver > went right to work. > > Just in case anyone hasn't figured out how to use it yet, I did an > in-house presentation a few weeks ago: > > > http://www.n2netsec.com/site/index.php?option=com_content&view=section&layout=blog&id=5&Itemid=89 > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ >
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
