Menu

Main Menu
Talk Get Daily Search

Member's Online

    User Name
    Password

    help me install aircrack-ng on N800

    Reply
    Page 4 of 4 | Prev |   2     3   4 |
    miagi | # 31 | 2007-10-21, 19:39 | Report

    Thanks Luca, it works now. But there is one problem left

    After airodump collected 1000 packages I started aircrack and told it to open the file.... but it says "5 packages found" instead of "1000 packages found"

    After 1000 packages were collected, I quit airodump with controlC... maybe that is the problem ?

    From the tutorial on that blog:

    "Type:

    aircrack-ng mycapture-01.ivs

    and hope for the best. Aircrack will try to crack the key, and if you have enough data captured it should crack the key eventually. If not, it will keep trying, as you gather more and more data, until you are successful"

    The fat printed text implies that I can run both programs together (airodump and aircrack); that I can run the aircrack without closing the collector program first.

    How ?

    Thanks,

    Phil

    Edit | Forward | Quote | Quick Reply | Thanks

     
    barry99705 | # 32 | 2007-10-21, 20:57 | Report

    Originally Posted by miagi View Post
    Thanks Luca, it works now. But there is one problem left

    After airodump collected 1000 packages I started aircrack and told it to open the file.... but it says "5 packages found" instead of "1000 packages found"

    After 1000 packages were collected, I quit airodump with controlC... maybe that is the problem ?

    From the tutorial on that blog:

    "Type:

    aircrack-ng mycapture-01.ivs

    and hope for the best. Aircrack will try to crack the key, and if you have enough data captured it should crack the key eventually. If not, it will keep trying, as you gather more and more data, until you are successful"

    The fat printed text implies that I can run both programs together (airodump and aircrack); that I can run the aircrack without closing the collector program first.

    How ?

    Thanks,

    Phil
    You're going to need about 200,000 more iv's to crack a wep key. Open another tab to run aircrack. Without injection you're going to need a pretty busy network to get enough packets. If you're trying to crack a wpa network forget it. You'll need a dictionary file to do that and even then the password will need to be in the dictionary.

    Edit | Forward | Quote | Quick Reply | Thanks

     
    miagi | # 33 | 2007-10-21, 21:18 | Report

    Originally Posted by luca View Post
    When airodump exits it leaves the interface active in monitor mode, maybe that was causing the battery drain?
    Last question: How do I end the monitor thing ?

    Thanks guys for your help, I really appreciate it !

    Edit | Forward | Quote | Quick Reply | Thanks

     
    miagi | # 34 | 2007-10-21, 21:36 | Report

    aaaand.... How do I delete previously written files in the home directory with xterm ? After my first attempts were a complete mess I want to start from zero again

    Edit | Forward | Quote | Quick Reply | Thanks

     
    kimh | # 35 | 2007-10-21, 23:40 | Report

    Originally Posted by luca View Post
    install wireless tools then it's just a matter of
    iwconfig wlan0 mode managed
    The reason I got wlan0 error because I did not run the following command:

    iwconfig wlan0 mode managed

    I got futher but still not final stage yet. Still learning...

    Edit | Forward | Quote | Quick Reply | Thanks

     
    DryGoatAir | # 36 | 2007-10-28, 15:39 | Report

    I've been monitoring this thread for some time now and I've found something that might solve the problem of packet injection.

    I currently own a Nintendo DS with a M3 Simply card, so I can run homebrew apps on it. I recently found a port of Aireplay to the DS:
    http://forum.gbadev.org/viewtopic.php?t=12666
    The only problem is, it can't save collected data.

    I'm no Linux expert (I know how to become root and that's about it) and I don't exactly how the principle of packet injection works, so I was wondering if it would be possible to inject the packets using an external device running Aireplay (a DS for instance) and collect the data on the N800. I tried running Aireplay on my DS and running Airodump at the same time, but Airodump just worked as crappy as ever on the N800

    Any ideas?

    Edit | Forward | Quote | Quick Reply | Thanks

     
    Kolyan | # 37 | 2007-10-28, 17:56 | Report

    I've been looking through this thread for a while, and am wondering if im missing something cause when i try to install wireless tools on the N800 it tells me that the package is incompatible with the current software is there a workaround??

    Edit | Forward | Quote | Quick Reply | Thanks

     
    zanglang | # 38 | 2007-10-29, 02:54 | Report

    Originally Posted by DryGoatAir View Post
    I've been monitoring this thread for some time now and I've found something that might solve the problem of packet injection.

    I currently own a Nintendo DS with a M3 Simply card, so I can run homebrew apps on it. I recently found a port of Aireplay to the DS:
    http://forum.gbadev.org/viewtopic.php?t=12666
    The only problem is, it can't save collected data.

    I'm no Linux expert (I know how to become root and that's about it) and I don't exactly how the principle of packet injection works, so I was wondering if it would be possible to inject the packets using an external device running Aireplay (a DS for instance) and collect the data on the N800. I tried running Aireplay on my DS and running Airodump at the same time, but Airodump just worked as crappy as ever on the N800

    Any ideas?
    Hmm, didn't get to read much from the thread, but the author wrote that "In this build, the only activated function is the Broadcast Deauthentification module which allow to deauthenticate every user connected to a specific Access Point. It's useful for capturing ARP Request or flooding the wifi trafic". That means you can use it for forcing clients to reauthenticate with the access point, usually causing them to send out ARP requests. It's still not quite enough to quickly do a WEP attack though, you still need some way to reinject the ARP packets captured after the deauth step, which the N800 can't do. Would make a nifty little DDoS tool though.

    Edit | Forward | Quote | Quick Reply | Thanks

     
    Page 4 of 4 | Prev |   2     3   4 |
vBulletin® Version 3.8.8
Normal Logout