Menu

Main Menu
Talk Get Daily Search

Member's Online

    User Name
    Password

    [Maemo 5] fAircrack (Aircrack GUI)

    Reply
    Page 70 of 124 | Prev | 60   68     69   70   71     72   80 | Next | Last
    codecxbox | # 691 | 2011-04-23, 01:50 | Report

    faircrack works for me, under these conditions:

    1- First I have to load the modified wl12 drivers in xterminal.
    sh load.sh

    2- Then I have to load faircrack in xterminal.
    sh launch.sh

    Which is very good because you get to see all 3 processes at the same time. Most times, packet injection will stop, so just monitor the packet injection window. If it closes by itself, just touch Packet Injection again without having to launch faircrack again.

    3- you really need another wifi device to start a deauth session. The N900 by itself will most likely never deauth a AP.

    4-After the faircrack session, to reestablish normal wifi , just unload the modified wl drivers
    sh unload.sh

    Hope it helps...

    Edit | Forward | Quote | Quick Reply | Thanks

     
    TobiasReaper | # 692 | 2011-04-24, 11:10 | Report

    First, a big ty for FRuMMaGe for making this app ^^

    If anyone has the link for WEPCrackGUI, please do share.

    I wanted to ask regarding the WEP process. As I see, there is capture, authenticate and injection - 3 steps.

    Are step 2 and 3 (authenticate and injection) really necessary?

    I tried to capture 20k packets (#data) and decrypt straight away and I was able to get the WEP password. Can someone explain why would I need to authenticate and inject?

    (Also, I can connect to the network but there is no internet connectivity - ill try to use one of the mac address, from the capture window - just fyi if its somehow related)

    Thanks in advance for those who will answer my doubts.

    Edit | Forward | Quote | Quick Reply | Thanks

    Last edited by TobiasReaper; 2011-04-24 at 11:14.

     
    StefanL | # 693 | 2011-04-24, 12:20 | Report

    Purpose of the injection is to create extra traffic on a slow yield network; so use as needed on a case by case basis.

    Edit | Forward | Quote | Quick Reply | Thanks
    The Following User Says Thank You to StefanL For This Useful Post:
    TobiasReaper

     
    TobiasReaper | # 694 | 2011-04-24, 12:22 | Report

    and authenticate?

    Edit | Forward | Quote | Quick Reply | Thanks

     
    shardul | # 695 | 2011-04-24, 13:44 | Report

    It says root is not in sudoers files, Can anyone please help

    Edit | Forward | Quote | Quick Reply | Thanks

     
    topet2k12001 | # 696 | 2011-04-24, 16:49 | Report

    Originally Posted by TobiasReaper View Post
    First, a big ty for FRuMMaGe for making this app ^^

    If anyone has the link for WEPCrackGUI, please do share.
    Here you go...

    http://sourceforge.net/projects/wepcrackgui/
    http://forum.aircrack-ng.org/index.p...b&topic=6329.0

    Edit | Forward | Quote | Quick Reply | Thanks
    The Following User Says Thank You to topet2k12001 For This Useful Post:
    TobiasReaper

     
    codecxbox | # 697 | 2011-04-24, 17:22 | Report

    Originally Posted by TobiasReaper View Post
    and authenticate?
    You really do not need these 2 steps, if the AP you are attacking has a lot of wifi traffic, like if other clients are connected to the AP at the same time and those clients are active, like downloading or torrenting. But if these clients are idle or the AP doesnt have any clients attached, it would take a long time to capture enough packets for Aircrack to decrypt.
    Its like if you attack a AP in a shopping mall, you wouldnt have to inject and authenticize. But if you were in a desert attacking a AP without any clients, you would have to inject. Think about like your N900 doing 2 jobs at the same time, a normal client and the attacker.

    Edit | Forward | Quote | Quick Reply | Thanks
    The Following User Says Thank You to codecxbox For This Useful Post:
    TobiasReaper

     
    shardul | # 698 | 2011-04-24, 17:38 | Report

    Guys I get it working but when I type aircrack-ng work*.ivs to get wep key it says "quitting aircrack-ng"???

    Edit | Forward | Quote | Quick Reply | Thanks

     
    TobiasReaper | # 699 | 2011-04-25, 13:35 | Report

    Originally Posted by codecxbox View Post
    You really do not need these 2 steps, if the AP you are attacking has a lot of wifi traffic, like if other clients are connected to the AP at the same time and those clients are active, like downloading or torrenting. But if these clients are idle or the AP doesnt have any clients attached, it would take a long time to capture enough packets for Aircrack to decrypt.
    Its like if you attack a AP in a shopping mall, you wouldnt have to inject and authenticize. But if you were in a desert attacking a AP without any clients, you would have to inject. Think about like your N900 doing 2 jobs at the same time, a normal client and the attacker.
    I see, thanks alot.

    Now I can try authenticate and inject when im having no activity. Though some WEP APs do not even respond to the authenticate (AID etc).... what do to then?

    at other times i get AID: 1 but 0 ARPs at the injection part. when i look back at the capture screen, #data is still zero :S

    i guess its the third step which actually creates the #data packets (assuming im the only client connected).

    Edit | Forward | Quote | Quick Reply | Thanks

     
    codecxbox | # 700 | 2011-04-25, 23:26 | Report

    Thats why I use another wifi device to kick the capture process. It would be great if you have a cheap wifi device like a old wifi phone or a PSP, etc. It doesnt even have to connect to the AP, only try to communicate. As the device tries to connect and the AP rejects the unauthorized device, your N900 will start capturing a lot of packets. When it stops recieving packetsm then kick start the AP again with your WIFI device. Most routers will be rejecting unauthorized devices like for around 2 minutes. enough time to collect around 10,000 IVS. Most of the time youll need at least 20,000 IVS so that Aircrack calculates a pattern of keys. If your N900 is showing a AID=1 sucessful, then injection is working OK, problem is that N900 is a little weak wifi hardware wise. (Seems like a temperature issue).
    Anyway, try testing with a known router, start with 64 bit encryption, and there on.
    Also, many recent routers wont respond to a random auth packet, it will reject without any negociation between it and unauthorized clients. Those routers have the Secure mode button, very hard to attack.
    Sure youll look either like a super geek or a super FBI agent pressing screens on 2 devices but hey, its called testing, right?

    Edit | Forward | Quote | Quick Reply | Thanks

     
    Page 70 of 124 | Prev | 60   68     69   70   71     72   80 | Next | Last
vBulletin® Version 3.8.8
Normal Logout