there no way to crack WPA faster it take me 6 hours to capture the handshake
Time is irrelevant in terms of the handshake. It is generated when a client legitimately authenticates with the access point. You could be listening to traffic for days or weeks and if there is no client connection then you will never capture the handshake.
That is why deauthentication is important. It allows you to forcibly kick the client from the access point and force it to reconnect, thus generating a handshake that can be captured.
Serious question guys and really do not want to troll back tru threads, i have no issues what so ever in testing wep, but wpa how do i deathenticate clients? and how do i find there mac add, to kick them.
Yeah, deauthentication, check the earlier posts, still working on it
The ability to be able to (kick) deauthenticate a client is very important to be able to do if you don't want to wait around for ever to collect the 4Way handshake.
If you had a deauthenticate button in Faircrack you could collect the 4Way handshake in seconds.
We could also do with pyrit on the N900 so we can check that the captured WPA 4Way handshake is good because sometimes airodump-ng says the 4Way handshake has been collected but it does not contain enough information so is no good.
As I described on the previous page, about a wep crack, I got about 60000 ivs and the decryption code was 24 numbers long. I tried again, this time with almost 130000 ivs but the result was exactly the same. Can someone explain me what Im missing?
faircrack0.41 does not work for me. when I click on start packet capture the app freeze.
Ok, maybe need some more info here to be able to troubleshoot.
1) Faircrack 0.3 worked perfectly (ie. the 0.41 Update requires 0.3 to be installed and working).
2) You made back-up copies of the original files that 0.41 replaces.
3) You have all 7 of the new files on your system in the FAS directory (check with ls -al, dates of the new files should not be older than 25th May 2011).