Thanks Luca, it works now. But there is one problem left
After airodump collected 1000 packages I started aircrack and told it to open the file.... but it says "5 packages found" instead of "1000 packages found"
After 1000 packages were collected, I quit airodump with controlC... maybe that is the problem ?
From the tutorial on that blog:
"Type:
aircrack-ng mycapture-01.ivs
and hope for the best. Aircrack will try to crack the key, and if you have enough data captured it should crack the key eventually. If not, it will keep trying, as you gather more and more data, until you are successful"
The fat printed text implies that I can run both programs together (airodump and aircrack); that I can run the aircrack without closing the collector program first.
Thanks Luca, it works now. But there is one problem left
After airodump collected 1000 packages I started aircrack and told it to open the file.... but it says "5 packages found" instead of "1000 packages found"
After 1000 packages were collected, I quit airodump with controlC... maybe that is the problem ?
From the tutorial on that blog:
"Type:
aircrack-ng mycapture-01.ivs
and hope for the best. Aircrack will try to crack the key, and if you have enough data captured it should crack the key eventually. If not, it will keep trying, as you gather more and more data, until you are successful"
The fat printed text implies that I can run both programs together (airodump and aircrack); that I can run the aircrack without closing the collector program first.
How ?
Thanks,
Phil
You're going to need about 200,000 more iv's to crack a wep key. Open another tab to run aircrack. Without injection you're going to need a pretty busy network to get enough packets. If you're trying to crack a wpa network forget it. You'll need a dictionary file to do that and even then the password will need to be in the dictionary.
aaaand.... How do I delete previously written files in the home directory with xterm ? After my first attempts were a complete mess I want to start from zero again
I've been monitoring this thread for some time now and I've found something that might solve the problem of packet injection.
I currently own a Nintendo DS with a M3 Simply card, so I can run homebrew apps on it. I recently found a port of Aireplay to the DS: http://forum.gbadev.org/viewtopic.php?t=12666
The only problem is, it can't save collected data.
I'm no Linux expert (I know how to become root and that's about it) and I don't exactly how the principle of packet injection works, so I was wondering if it would be possible to inject the packets using an external device running Aireplay (a DS for instance) and collect the data on the N800. I tried running Aireplay on my DS and running Airodump at the same time, but Airodump just worked as crappy as ever on the N800
I've been looking through this thread for a while, and am wondering if im missing something cause when i try to install wireless tools on the N800 it tells me that the package is incompatible with the current software is there a workaround??
I've been monitoring this thread for some time now and I've found something that might solve the problem of packet injection.
I currently own a Nintendo DS with a M3 Simply card, so I can run homebrew apps on it. I recently found a port of Aireplay to the DS: http://forum.gbadev.org/viewtopic.php?t=12666
The only problem is, it can't save collected data.
I'm no Linux expert (I know how to become root and that's about it) and I don't exactly how the principle of packet injection works, so I was wondering if it would be possible to inject the packets using an external device running Aireplay (a DS for instance) and collect the data on the N800. I tried running Aireplay on my DS and running Airodump at the same time, but Airodump just worked as crappy as ever on the N800
Any ideas?
Hmm, didn't get to read much from the thread, but the author wrote that "In this build, the only activated function is the Broadcast Deauthentification module which allow to deauthenticate every user connected to a specific Access Point. It's useful for capturing ARP Request or flooding the wifi trafic". That means you can use it for forcing clients to reauthenticate with the access point, usually causing them to send out ARP requests. It's still not quite enough to quickly do a WEP attack though, you still need some way to reinject the ARP packets captured after the deauth step, which the N800 can't do. Would make a nifty little DDoS tool though.