![]() |
can n900 crack WPA using Tkiptun-ng ?
Tkiptun-ng is a tool created by Martin Beck aka hirte, a member of aircrack-ng team. This tool is able to inject a few frames into a WPA TKIP network with QoS. He worked with Erik Tews (who created PTW attack) for a conference in PacSec 2008: “Gone in 900 Seconds, Some Crypto Issues with WPA”.
http://www.aircrack-ng.org/doku.php?id=tkiptun-ng |
Re: can n900 crack WPA using Tkiptun-ng ?
From what I can see on the link you provided I'd say probably not. It seems to depend on a driver. We have the newly released drivers that allow injection but I am unsure as to whether they will support this. You could always try to cross compile it and give it a go though!
|
Re: can n900 crack WPA using Tkiptun-ng ?
Quote:
and he can make a new driver which support tkipun-ng ,and look at his project http://david.gnedt.eu/blog/wl1251/ he'v made alot of things work :)) |
Re: can n900 crack WPA using Tkiptun-ng ?
Quote:
1. If you want lxp to keep developing the injection driver, donate to the guy. If you have a job and an income, at least. 2. Install a Debian (or other, but Debian is easiest) virtual machine on your computer. Install the Maemo 5 SDK using the available-on-wiki installer. 3. Compile Aircrack-NG from the latest SVN code. I have done that, and I just looked at my X-Term commands - I have tkiptun-ng on my N900. I never tried running it, but I'm not sure why it wouldn't work. Hawaii is the resident expert on the matter (in my limited-knowledge-based opinion) and he never mentioned it not working. If you're capable of using tkiptun-ng, you're either actually smart and linux-savvy enough to know how it works, or you can read a manual/directions really well. Both of these mean you can compile your own aircrack-ng suite for the N900. |
Re: can n900 crack WPA using Tkiptun-ng ?
Quote:
2- i dont know how 2 use SDK :S 3- iam new in linux os so i dont know how 2 compile or programming. y dont u share ur project ?thx sry about my english :D |
Re: can n900 crack WPA using Tkiptun-ng ?
*cough* *cough* *cough*
first person to ask when i will put it in the repos gets punched in the face |
Re: can n900 crack WPA using Tkiptun-ng ?
Lol - I was considering doing that, but looks like you beat me to it. My plan actually was to eventually request maintainer status for the now-never-updated-in-repo Aircrack-NG suite.
But I need to have the spare time to figure out how to make autobuilder work, and all the other mandatory stuff. P.S. If you can't figure out compiling, it is probably not a good idea to try to fiddle with tkiptun-ng. I mean, the very aircrack-ng wiki says that. |
Re: can n900 crack WPA using Tkiptun-ng ?
oh heyyyy, what's up guyth?
tkiptun-ng can inject valid packets into a stream. It's not meant to "crack WPA" at all. It's a complete PoC for communication on a WPA-TKIP protected network, but not actually authenticating before hand. Having said that, you don't need a new driver. wl1251-bleeding-edge already supports live frame injection without association. Any tools you find that require RFMON will work perfectly fine. The simple fact that you want a new driver to "support" this indicates you need to do more research on the subject. Good day sir. |
Re: can n900 crack WPA using Tkiptun-ng ?
I think he wasn't sure if this driver worked with this specifically, because of what's said on this wiki page: http://www.aircrack-ng.org/doku.php?id=tkiptun-ng
Namely about how only a few drivers have been tested with this, and one is known to completely fail. I presume they logically supposed that it's possible that there's some specific function of live frame injection that some drivers could/couldn't do, even when they could do live frame injection in general. I mean, bugs like that do happen, maybe not in this exact field, but in general so that people with mid-level technical know-how on the subject aren't sure whether or not that's possible. That said, I agree with you on the do-more-research bit, albeit for the above stated reasons in my earlier posts, not just because of what you pointed out. |
Re: can n900 crack WPA using Tkiptun-ng ?
Quote:
same as the previous version :S there's no tkiptum-ng!!! |
Re: can n900 crack WPA using Tkiptun-ng ?
Quote:
about fiddle with tkiptun-ng i think it worth :)) |
Re: can n900 crack WPA using Tkiptun-ng ?
Quote:
wt about this http://airodump.net/wpa-security-broken-pacsec/ |
Re: can n900 crack WPA using Tkiptun-ng ?
Honestly, I don't know the changelog. But if you care about the details, then look at the version string of the Aircrack-NG in the repos, and the Aircrack-NG Creamy Goodness compiled. If nothing else, this will be guaranteed (most likely) to have A: More binaries/commands - such at the tkiptun-ng that you wanted - maybe a couple of other ones that weren't included in the repository one, depending on how Creamy Goodness compiled it. Two, it won't have the retarted iw conflict, so you can apt-get install iw, and airmon-ng will work properly, unlike the way it does now. |
Re: can n900 crack WPA using Tkiptun-ng ?
Quote:
sry abt my english :$ hehe btw wt about the professional users like mohammadAG ,...etc ? |
Re: can n900 crack WPA using Tkiptun-ng ?
security research from Mark Tew as a next (not brute force), new implementation of the WPA-TKIP attack. WPA-TKIP security based on the dynamic key generation was supposed to be by laicks and professionals as unbreakable. Much more safe then funny WEP encription.
According to the references Mark Tew and Martin Beck will present a way how to pass TKIP (Temporal Key Integrity Protocol), that is know as the one that uses a dynamic key generation for each of data block. The time needed for successful WPA cracking is 12 to 15 minutes. So don’t forget to check fresh materials from the PACSEC 2008 conference. The details will be published also here at Remote Security. |
Re: can n900 crack WPA using Tkiptun-ng ?
the one i posted is updating 1.0 from the repos to 1.1 from the aircrack-ng site. I honestly don't know the changes, but it properly puts the card into monitor mode, or at least appears to do so. I didn't test it much, so I can't really say. I put a dependancy on iw, app manger is a pile of sh1t so it won't fetch iw for you, figure out how to apt-get iw first...
I don't know what you are quoting about the tool, honestly it IS hard to understand from the aircrack-ng article, go read the one on ars-technica and you will see all it does it allows some packets to be inserted to the network, nothing to do with key-recovery. http://arstechnica.com/security/news...pa-cracked.ars just read the last section, stuff like this is simpler to understand i hope: Quote:
|
Re: can n900 crack WPA using Tkiptun-ng ?
i'v installed iw :)
Please remember this is an extremely advanced attack. You must possess advanced linux and aircrack-ng skills to use this tool. DO NOT EXPECT support unless you can demonstrate you have these skills. -->i am not !!! :'( and i think it's a tool to crack wpa and crack = password :PPP |
Re: can n900 crack WPA using Tkiptun-ng ?
As has been explain by Hawaii, it doesn't crack the password. It allows you to send at most 7 packets/frames. 7. If you watch packet counts, an internet connection to a website typically fetches a couple hundred packets a second.
This is not a password cracking tool. This a really low-level, really knowledge-requiring, hacking tool for very specific attacks. |
Re: can n900 crack WPA using Tkiptun-ng ?
Quote:
i think so :'( there always a hope ryt ?:DD u'll never know if they can use this tool in future or not :D ,maybe oneday u'll find it easier than WEP cracking :DDD thx |
Re: can n900 crack WPA using Tkiptun-ng ?
well, there's not much hope. that tool was released back in 2008, and it doesn't work in wpa-aes and is probably one of the reasons we all use wpa2 now!
it's still cool though, just not very useful... |
| All times are GMT. The time now is 01:01. |
vBulletin® Version 3.8.8