Wicd validating authentification
I could not find any other possibility to alter the WPS settings on the router or any way to disable the PIN.
(There is actually a firmware upgrade for the router; v2.1.02, issued on , so although the update may prevent the WPS vulnerability or give more options to REALLY disable WPS, I haven't checked its possibilities as yet).
Please try these steps; it turns out this was the reason I could never get NDISwrapper to work in the first place and caused me endless frustration.
If you see “module=ssb” shows up in the output then let’s try temporarily removing all potentially unnecessary modules and re-adding only the important ones.
Tested on a Samsung N110, Atheros chipset, ath5k drivers for the wireless. I had better results (less errors) when using a wireless adapter with REALTEK RTL8187L chipset with the rtl8187 driver. Well, in my case, I bought a different/better router the day after I figured out that my router was still vulnerable.. otherwise I was going to stay feeling uncertain ;) Other cheaper options ; -------- My previous remarks on MAC spoofing being an issue were incorrect. :| The way reaver works with mac spoofing is to ensure that the Physical interface also has the mac spoofed.
Depends on your setup, however in my case -------- I have been having issues with the latest version of reaver; v1.4, with it failing to associate whereas v1.3 associated fine.
You may not have a ~/Download folder; just create a “Wireless” folder under whatever directory you do use for downloads.
If you don’t see anything new in your Network Manager, then let’s check something.
Through a lot of frustration, trial, error, and the help of a certain bit of Ubuntu documentation I did manage to get the BCM4309 working using NDISwrapper. : Using NDISwrapper, I can now connect to my school’s network great despite the signal strength not being as good as what the b43legacy driver reported.Since the pin numbers are all numeric, there are 10^8 (100,000,000) possible values for any given pin The key space is reduced even further due to the fact that the WPS authentication protocol cuts the pin in half and validates each half individually.