Notices


Reply
Thread Tools
Posts: 182 | Thanked: 84 times | Joined on Jul 2010 @ Jordan
#241
Originally Posted by stevomanu View Post
i use bactrack4 r2 an its ace , got every thing you need all in a nice package !!

only problem im having is gettin backtrack to reconize my n900 thats proving a nightmare
backtrack doesn't recognize n900 ?! :S

how to use john via pipe in n900?
 
Posts: 529 | Thanked: 194 times | Joined on Aug 2010 @ UK
#242
Originally Posted by fatcobrah View Post
backtrack doesn't recognize n900 ?! :S

how to use john via pipe in n900?
no i have been tryed to use gparted but it never picks up my n900 , also been trying to make my own flashable image but again backtrack doesnt see it ..

nightmare

never used it to be honest , an never will on my phone as it unrealisic to think n900 is gunna crack a wpa/wpa2 key really would take to long . .

using backtrack will help you figure it out there is a good script for it give me a shout if you want it easy to use


check this out for john the ripper commands or check out backtrack forums i aint a fan thou as they a little harsh on new posters
__________________
METASPLOIT INSTALL N900
Keep the forums clean
Dont forget to say thanks

Last edited by stevomanu; 2011-01-31 at 16:57.
 

The Following User Says Thank You to stevomanu For This Useful Post:
Posts: 268 | Thanked: 75 times | Joined on Jan 2011
#243
Thanks for your excellent app.

But i have a problem. I enable inyetion and monitor mode:

Custom wl1251 module loaded (with injection)
I scan for wep and i find one, but when i select it, i get this error:

Traceback (most recent call last):
File "Main.py", line 142, in doEnableCapture
self.essid = infoList[0]
IndexError: list index out of range
And when i click on start packet capture:

Traceback (most recent call last):
File "Main.py", line 164, in doCapture
self.essid = infoList[0]
IndexError: list index out of range
Thanks in advance for your help.
 
FRuMMaGe's Avatar
Posts: 330 | Thanked: 483 times | Joined on Dec 2010 @ Norwich, UK
#244
Originally Posted by Brian_7 View Post
Thanks for your excellent app.

But i have a problem. I enable inyetion and monitor mode:



I scan for wep and i find one, but when i select it, i get this error:



And when i click on start packet capture:



Thanks in advance for your help.
How are you running it? You should make sure you either use the launch.sh script or if you are loading Main.py directly then make sure you are in the FAS directory.
__________________
OMNOM: Pacman-like game now in extras-devel

fAircrack (Aircrack GUI): Point-and-click pwnage for your N900
Now with John the Ripper integration
 

The Following User Says Thank You to FRuMMaGe For This Useful Post:
Posts: 268 | Thanked: 75 times | Joined on Jan 2011
#245
Originally Posted by FRuMMaGe View Post
How are you running it? You should make sure you either use the launch.sh script or if you are loading Main.py directly then make sure you are in the FAS directory.

I just open the x-terminal and type:

cd MyDocs/FAS/

sh launch.sh #(or python Main.py)


But i always get that error. I don't know why.

Last edited by Brian_7; 2011-01-31 at 20:45.
 
FRuMMaGe's Avatar
Posts: 330 | Thanked: 483 times | Joined on Dec 2010 @ Norwich, UK
#246
Originally Posted by Brian_7 View Post
I just open the x-terminal and type:

cd MyDocs/FAS/

sh launch.sh #(or python Main.py)


But i always get that error. I don't know why.
Are you running as root? If so then just run as a normal user.

cd to the FAS directory and post the output of "ls"
__________________
OMNOM: Pacman-like game now in extras-devel

fAircrack (Aircrack GUI): Point-and-click pwnage for your N900
Now with John the Ripper integration
 

The Following User Says Thank You to FRuMMaGe For This Useful Post:
Posts: 268 | Thanked: 75 times | Joined on Jan 2011
#247
I run it as a normal user (as root user, it didn't start)

Here the output of ls:

~ $ cd MyDocs/FAS/
~/MyDocs/FAS $ ls .
FAS.py getinterfacestate.sh readAP.sh
FAS.pyo getmacmanaged.sh scan.sh
Main.py getmacmonitor.sh scanresults.txt
cap interface.txt temp-01.cap
caplist.txt keylist.txt temp-01.csv
currentAP.txt keys temp-01.kismet.csv
diction launch.sh temp-01.kismet.netxml
dictionlist.txt load.sh unload.sh
getinfo.sh mymac.txt
 
FRuMMaGe's Avatar
Posts: 330 | Thanked: 483 times | Joined on Dec 2010 @ Norwich, UK
#248
Originally Posted by Brian_7 View Post
I run it as a normal user (as root user, it didn't start)

Here the output of ls:
Hmmm...

Basically the "out of range" error is because it is trying to gather information from the output of the "scanresults.sh" script but for some reason the file is empty.

Post the output of these commands from the FAS directory:

cat scanresults.txt
cat currentAP.txt
cat interface.txt

EDIT: I will be uploading the next version of fAircrack in a few hours. Just finishing off the John integration. Maybe you will have better luck with it.
__________________
OMNOM: Pacman-like game now in extras-devel

fAircrack (Aircrack GUI): Point-and-click pwnage for your N900
Now with John the Ripper integration
 

The Following User Says Thank You to FRuMMaGe For This Useful Post:
Posts: 268 | Thanked: 75 times | Joined on Jan 2011
#249
Originally Posted by FRuMMaGe View Post
Hmmm...

Basically the "out of range" error is because it is trying to gather information from the output of the "scanresults.sh" script but for some reason the file is empty.

Post the output of these commands from the FAS directory:

cat scanresults.txt
cat currentAP.txt
cat interface.txt

EDIT: I will be uploading the next version of fAircrack in a few hours. Just finishing off the John integration. Maybe you will have better luck with it.
Here you have:

~ $ cd MyDocs/FAS/
~/MyDocs/FAS $ cat scanresults.txt
Wi-FiArnet
~/MyDocs/FAS $ cat currentAP.txt
~/MyDocs/FAS $ cat interface.txt
Ma
~/MyDocs/FAS $
 
Posts: 268 | Thanked: 75 times | Joined on Jan 2011
#250
Thanks for your help. Yesterday When i had this problem i used vi to edit Main.py and i found ^M in every single line. I deleted all the ^M but it didn't work.

Last edited by Brian_7; 2011-01-31 at 22:42.
 
Reply

Tags
aircrack, aircrack-ng, epicfacepalm, pen testing, rtfm dude!

Thread Tools

 
Forum Jump


All times are GMT. The time now is 13:52.