The original version is slow to detect ap , 0.41 is instant to discover ap, and in 7 min i was able to get 80k ivs, try to decrypt was instant
Not sure this can be credited to fAircrack, since it is only a ui for using the aircrack programs. All I did is streamline some of the code in the scripts and the ui. Anyway, it is good to hear from happy customers.
Easiest way to find the attached clients bssid is to capture packets, any attached clients are shown there on the packet capture xterm screen.
Since you are already capturing packets, open another xterm (CTRL-Shift-X) to deauth the attached client and you should be able to capture the handshake.
Thanks heaps for your reply, now i just have a question
Here is the code right
aireplay-ng -0 2 -a 00:11:22:33:44:55 -c 99:88:77:66:55:44 wlan0
But what is the actual code and what is the bssid?
To me that looks like two mac address one before the -a and one after -c?
Thanks if you could help me with that.
Now another thing, Which page is the instructions on that shows steps to install faircrack 0.4.1..
Im Assuming the first bssid that shows up when i click capture packets, is the bssid of the actuall router? when another bssid shows up under it its the same as the bssid above but there now is a station bssid which one do i use i tried the same bssid for -a and -c and i think i kicked off the router as it dissapeared and came back
Thanks heaps for your reply, now i just have a question
Here is the code right
aireplay-ng -0 2 -a 00:11:22:33:44:55 -c 99:88:77:66:55:44 wlan0
the first bssid (00:11:22:33:44:55) is the router that you want to cracked & the second bssid (99:88:77:66:55:44) is the mac address that currently connected to that router....
the code above is for you to deauthenticated the second bssid from the main router to make it try to reconnect again & again to the router...this reconnections will give give plenty of data while capturing the router for WEP cracking or capturing WPA handshake...
Thanks heaps for your reply, now i just have a question
Here is the code right
aireplay-ng -0 2 -a 00:11:22:33:44:55 -c 99:88:77:66:55:44 wlan0
But what is the actual code and what is the bssid?
To me that looks like two mac address one before the -a and one after -c?
Thanks if you could help me with that.
Now another thing, Which page is the instructions on that shows steps to install faircrack 0.4.1..
Thanks in Advance
aireplay-ng -0 2 -a 00:11:22:33:44:55 -c 99:88:77:66:55:44 wlan0
aireplay-ng -0 tells aireplay-ng to send deauth packets
2 tells aireplay-ng the number of times to attempt deauth
-a is the mac address of the AP you attack
-c is the mac address of the client you want to deauth
wlan0 is the name of the wireless iface of your phone