View Single Post
Estel's Avatar
Posts: 5,028 | Thanked: 8,613 times | Joined on Mar 2011
#263
Originally Posted by Saturn View Post
some late answer - better late than never they say..



Your case should be working fine since version 1.12-2.
one limitation of "all common" (which comes from a limitation of aircrack) is that you cannot mix .cap and .ivs files.
I'll check that after getting back from current trip (so I'll get access to my router)


Originally Posted by Saturn View Post
Since Cleven doesn't provide a way to create ARP files or use them then it doesn't look relevant to me..
OK, I haven't been clear enough on this. I mean that, when You crack WEP password using package injection, You need ARP. If You can't craft one (using Cleven only, you can't obviously), the only way is to capture legit one from connected client, and re-send it (which is possible with Cleven - package injection option automatically listen fro ARP and inject it, when got at least one).

Now, when You got idle client connected to AP, it may take quite long time, until ARP packet is send - on situations, where proper power-saving is used, it may even never happen (until client start to actively use network). So, best way of getting legit ARP quickly, is to deauth client - it makes it automatically re-authenticate (and get out of power-saving mode, for a while), so ARP is send, and our rogue device capture and inject it.

Still, client aimed deauthentication is somehow hard to implement in Cleven, if I understand You correctly. Ho ever, in most cases, AP-targeted deauthentication works well (AP just deauth all connected clients). AFAIK, it is possible to implement it without much hassle (latest fAircrack got this, while it - just like Cleven - can't implement client-targeted deauth). So, it would be great, to have a nice little button in Cleven interface, to do just that - AP aimed deauthentication

---

If I remember correctly, some pages ago You've said, that You thought, that client MAC is always needed to send deauth packet, and I answered that aircrack can be used also without client MAC specified + I provided link to aircrack FAQ page, where was stated that this method is "less efficient", than client-aimed deauth. Still, AP-only targeted deauth seems to work in practice - I've yet to see a case, where I would be unable to do so.

Also, if I remember correctly, You acknowledged that and promised to include AP deauth option but, I may have messed something (mixed memories from different discussions, or whatsnot). So, in any case, glad to be of any help.

/Estel
__________________
N900's aluminum backcover / body replacement
-
N900's HDMI-Out
-
Camera cover MOD
-
Measure battery's real capacity on-device
-
TrueCrypt 7.1 | ereswap | bnf
-
Hardware's mods research is costly. To support my work, please consider donating. Thank You!
 

The Following User Says Thank You to Estel For This Useful Post: