Lol - I was considering doing that, but looks like you beat me to it. My plan actually was to eventually request maintainer status for the now-never-updated-in-repo Aircrack-NG suite.
But I need to have the spare time to figure out how to make autobuilder work, and all the other mandatory stuff.
P.S. If you can't figure out compiling, it is probably not a good idea to try to fiddle with tkiptun-ng. I mean, the very aircrack-ng wiki says that.
bro i dont
about fiddle with tkiptun-ng i think it worth )
tkiptun-ng can inject valid packets into a stream. It's not meant to "crack WPA" at all. It's a complete PoC for communication on a WPA-TKIP protected network, but not actually authenticating before hand.
Having said that, you don't need a new driver. wl1251-bleeding-edge already supports live frame injection without association. Any tools you find that require RFMON will work perfectly fine. The simple fact that you want a new driver to "support" this indicates you need to do more research on the subject. Good day sir.
If you can't look up the version numbers to get the change log, why on earth are you asking for tkiptun-ng? Bah, IDK, I'm being more dickish today than is right methinks.
Honestly, I don't know the changelog. But if you care about the details, then look at the version string of the Aircrack-NG in the repos, and the Aircrack-NG Creamy Goodness compiled.
If nothing else, this will be guaranteed (most likely) to have A: More binaries/commands - such at the tkiptun-ng that you wanted - maybe a couple of other ones that weren't included in the repository one, depending on how Creamy Goodness compiled it.
Two, it won't have the retarted iw conflict, so you can apt-get install iw, and airmon-ng will work properly, unlike the way it does now.
Namely about how only a few drivers have been tested with this, and one is known to completely fail. I presume they logically supposed that it's possible that there's some specific function of live frame injection that some drivers could/couldn't do, even when they could do live frame injection in general. I mean, bugs like that do happen, maybe not in this exact field, but in general so that people with mid-level technical know-how on the subject aren't sure whether or not that's possible.
That said, I agree with you on the do-more-research bit, albeit for the above stated reasons in my earlier posts, not just because of what you pointed out.
doing research about this tool ? icant find information about this tool or any proved example :S & as i told u before i am not a programmer and i find it as a good idea to make it happen
sry abt my english :$ hehe
btw wt about the professional users like mohammadAG ,...etc ?
security research from Mark Tew as a next (not brute force), new implementation of the WPA-TKIP attack. WPA-TKIP security based on the dynamic key generation was supposed to be by laicks and professionals as unbreakable. Much more safe then funny WEP encription.
According to the references Mark Tew and Martin Beck will present a way how to pass TKIP (Temporal Key Integrity Protocol), that is know as the one that uses a dynamic key generation for each of data block. The time needed for successful WPA cracking is 12 to 15 minutes. So don’t forget to check fresh materials from the PACSEC 2008 conference. The details will be published also here at Remote Security.
the one i posted is updating 1.0 from the repos to 1.1 from the aircrack-ng site. I honestly don't know the changes, but it properly puts the card into monitor mode, or at least appears to do so. I didn't test it much, so I can't really say. I put a dependancy on iw, app manger is a pile of sh1t so it won't fetch iw for you, figure out how to apt-get iw first...
I don't know what you are quoting about the tool, honestly it IS hard to understand from the aircrack-ng article, go read the one on ars-technica and you will see all it does it allows some packets to be inserted to the network, nothing to do with key-recovery.
just read the last section, stuff like this is simpler to understand i hope:
Originally Posted by
To describe the attack succinctly, it's a method of decrypting and arbitrarily and successfully re-encrypting and re-injecting short packets on networks that have devices using TKIP. That's a very critical distinction; this is a serious attack, and the first real flaw in TKIP that's been found and exploited. But it's still a subset of a true key crack.
i'v installed iw
Please remember this is an extremely advanced attack. You must possess advanced linux and aircrack-ng skills to use this tool. DO NOT EXPECT support unless you can demonstrate you have these skills. -->i am not !!! :'(
and i think it's a tool to crack wpa and crack = password :PPP
As has been explain by Hawaii, it doesn't crack the password. It allows you to send at most 7 packets/frames. 7. If you watch packet counts, an internet connection to a website typically fetches a couple hundred packets a second.
This is not a password cracking tool. This a really low-level, really knowledge-requiring, hacking tool for very specific attacks.
As has been explain by Hawaii, it doesn't crack the password. It allows you to send at most 7 packets/frames. 7. If you watch packet counts, an internet connection to a website typically fetches a couple hundred packets a second.
This is not a password cracking tool. This a really low-level, really knowledge-requiring, hacking tool for very specific attacks.
:'(((((((((((((((((((((((((((((((
i think so :'(
there always a hope ryt ?D u'll never know if they can use this tool in future or not ,maybe oneday u'll find it easier than WEP cracking DD
thx
well, there's not much hope. that tool was released back in 2008, and it doesn't work in wpa-aes and is probably one of the reasons we all use wpa2 now!
it's still cool though, just not very useful...