Menu

Main Menu
Talk Get Daily Search

Member's Online

    User Name
    Password

    [Maemo 5] fAircrack (Aircrack GUI)

    Reply
    Page 83 of 124 | Prev | 73   81     82   83   84     85   93 | Next | Last
    StefanL | # 821 | 2011-06-14, 20:53 | Report

    Originally Posted by q6600 View Post
    The original version is slow to detect ap , 0.41 is instant to discover ap, and in 7 min i was able to get 80k ivs, try to decrypt was instant
    Not sure this can be credited to fAircrack, since it is only a ui for using the aircrack programs. All I did is streamline some of the code in the scripts and the ui. Anyway, it is good to hear from happy customers.

    Edit | Forward | Quote | Quick Reply | Thanks

     
    StefanL | # 822 | 2011-06-14, 20:56 | Report

    Originally Posted by anapospastos View Post
    Because I couldnt find the ascii code. I finally solved it and first wep key cracked
    Good to hear you solved it. These threads are used for sharing solutions .

    Edit | Forward | Quote | Quick Reply | Thanks

     
    lucas777 | # 823 | 2011-06-15, 02:01 | Report

    Originally Posted by StefanL View Post
    Trine provides the command here not sofar back in the thread :
    http://talk.maemo.org/showpost.php?p...&postcount=762

    Easiest way to find the attached clients bssid is to capture packets, any attached clients are shown there on the packet capture xterm screen.

    Since you are already capturing packets, open another xterm (CTRL-Shift-X) to deauth the attached client and you should be able to capture the handshake.
    Thanks heaps for your reply, now i just have a question

    Here is the code right
    aireplay-ng -0 2 -a 00:11:22:33:44:55 -c 99:88:77:66:55:44 wlan0

    But what is the actual code and what is the bssid?

    To me that looks like two mac address one before the -a and one after -c?

    Thanks if you could help me with that.


    Now another thing, Which page is the instructions on that shows steps to install faircrack 0.4.1..

    Thanks in Advance

    Edit | Forward | Quote | Quick Reply | Thanks

     
    lucas777 | # 824 | 2011-06-15, 02:43 | Report

    Im Assuming the first bssid that shows up when i click capture packets, is the bssid of the actuall router? when another bssid shows up under it its the same as the bssid above but there now is a station bssid which one do i use i tried the same bssid for -a and -c and i think i kicked off the router as it dissapeared and came back

    Edit | Forward | Quote | Quick Reply | Thanks

     
    pusak gaoq | # 825 | 2011-06-15, 03:06 | Report

    Originally Posted by lucas777 View Post
    Thanks heaps for your reply, now i just have a question

    Here is the code right
    aireplay-ng -0 2 -a 00:11:22:33:44:55 -c 99:88:77:66:55:44 wlan0
    the first bssid (00:11:22:33:44:55) is the router that you want to cracked & the second bssid (99:88:77:66:55:44) is the mac address that currently connected to that router....
    the code above is for you to deauthenticated the second bssid from the main router to make it try to reconnect again & again to the router...this reconnections will give give plenty of data while capturing the router for WEP cracking or capturing WPA handshake...

    Edit | Forward | Quote | Quick Reply | Thanks

     
    Trine | # 826 | 2011-06-15, 08:06 | Report

    Originally Posted by lucas777 View Post
    Thanks heaps for your reply, now i just have a question

    Here is the code right
    aireplay-ng -0 2 -a 00:11:22:33:44:55 -c 99:88:77:66:55:44 wlan0

    But what is the actual code and what is the bssid?

    To me that looks like two mac address one before the -a and one after -c?

    Thanks if you could help me with that.


    Now another thing, Which page is the instructions on that shows steps to install faircrack 0.4.1..

    Thanks in Advance
    aireplay-ng -0 2 -a 00:11:22:33:44:55 -c 99:88:77:66:55:44 wlan0

    aireplay-ng -0 tells aireplay-ng to send deauth packets
    2 tells aireplay-ng the number of times to attempt deauth
    -a is the mac address of the AP you attack
    -c is the mac address of the client you want to deauth
    wlan0 is the name of the wireless iface of your phone

    Edit | Forward | Quote | Quick Reply | Thanks

     
    Swirnoff | # 827 | 2011-06-15, 08:30 | Report

    Originally Posted by jim_voy View Post
    Can anyone tell me, what approximate distance should it be in cracking wep/wpa keys?
    anything under -80dB should be suitable for cracking

    Edit | Forward | Quote | Quick Reply | Thanks

     
    stevomanu | # 828 | 2011-06-15, 09:16 | Report

    For all thou having trouble working things out check out these tutorials

    Code:
    http://www.aircrack-ng.org/doku.php?id=tutorial
    many thanks

    Edit | Forward | Quote | Quick Reply | Thanks

    Last edited by stevomanu; 2011-06-15 at 09:18.

     
    StefanL | # 829 | 2011-06-15, 10:37 | Report

    Originally Posted by lucas777 View Post
    Now another thing, Which page is the instructions on that shows steps to install faircrack 0.4.1..

    Thanks in Advance
    Check my signature, link has been fixed now

    Edit | Forward | Quote | Quick Reply | Thanks

    Last edited by StefanL; 2011-06-15 at 10:43.

     
    lucas777 | # 830 | 2011-06-15, 12:11 | Report





    Does this look right? the ssid under where it says station is that thw clients ssid? i ran the deauth but it doesnt seem to kick them?

    Where am i going wrong?

    Edit | Forward | Quote | Quick Reply | Thanks

     
    Page 83 of 124 | Prev | 73   81     82   83   84     85   93 | Next | Last
vBulletin® Version 3.8.8
Normal Logout