![]() |
Re: [Announce] Cleven - an aircrack gui
what steps to follow if data is not collected and i have done from 10b to 10d. after that what shud i do?
|
Re: [Announce] Cleven - an aircrack gui
Quote:
|
Re: [Announce] Cleven - an aircrack gui
Quote:
|
Re: [Announce] Cleven - an aircrack gui
macchanger is missing a vote here
Anyone that has tested it, found that it fulfils the criteria and hasn't vote? |
Re: [Announce] Cleven - an aircrack gui
Done, cap :)
|
Re: [Announce] Cleven - an aircrack gui
Version 1.10-1 is now in extras
- thanks for those testing and voting. - of course it is not complete and WPA is still limited. Uploaded in devel version 1.11-2. changes: * Fix (proper) for WAP authentication to accept spaces in network names. * Addition to store only IVs when in WEP capture (and save space). That is, I would appreciate if someone with his AP having spaces in the name could test it. |
Re: [Announce] Cleven - an aircrack gui
Quote:
i was unable to delete any IVs on decrypt capture menu..... |
Re: [Announce] Cleven - an aircrack gui
Quote:
EDIT:: Just uploaded version 1.11-3 with a fix for this issue. |
Re: [Announce] Cleven - an aircrack gui
Tested later version, everything seems to be in order. Nice job and thank You, Saturn!
I really miss deauthedntication, though. If no client-aimed deauth is possible now, even simple deauth AP-targeted would be a good thing to have, especially when collecting WEP ARP's for injection. Now, if someone wan't to use GUI-only solution, it's needed to use Cleven in tandem with fAircrack :) (fAircrack deauth, Cleven can mix IV's from many sessions. And yea, I admit it is much easier to use xterm command for lacking feature, no matter which GUI You use ;) ) Also, when we are talking about decrypting from different session's caps - possibility to use different sessions's caps (ARP's in it) for injection would be *really* great feature. |
Re: [Announce] Cleven - an aircrack gui
Quote:
AFAIK, there is only one. One needs to deauthenticate a client from the AP and for that the mac of a connected client is needed. ATM, my problem is to parse the MAC of a connected client from the xterm window running airodump-ng. If anyone wants to help, this is the task I lack for completing this part; code can be in shell or python. |
| All times are GMT. The time now is 21:30. |
vBulletin® Version 3.8.8