Notices


Reply
Thread Tools
Switch_'s Avatar
Posts: 601 | Thanked: 549 times | Joined on Mar 2010 @ Redditch, UK
#321
Originally Posted by backstabber8 View Post
"IVs" stand for?

what should i do?
Initialisation Vectors. Each of them carries a tiny portion of the key. Enable packet injections and wait for the quantity of ACK's to skyrocket - once you have 50,000 then try to decrypt.
__________________
---<|| Alt + F4 for GOD MODE ||>---
---<|| Deviant Art Linky Linky ||>---

Last edited by Switch_; 2011-02-03 at 12:36.
 

The Following User Says Thank You to Switch_ For This Useful Post:
Posts: 179 | Thanked: 49 times | Joined on Nov 2008
#322
Have you read the first post?

Originally Posted by FRuMMaGe View Post
WEP

Firstly a little background information from the aircrack wiki

"A little theory first. WEP is a really crappy and old encryption techinque to secure a wireless connection. A 3-byte vector, called an Initalization Vector or IV, is prepended onto packets and its based on a pre-shared key that all the authenticated clients know... think of it as the network key you need to authenticate.

Well if its on (almost) every packet generated by the client or AP, then if we collect enough of them, like a few hundred thousand, we should be able to dramatically reduce the keyspace to check and brute force becomes a realistic proposition."


First things first, from the 'Monitor' tab enable the packet injection drivers and then monitor mode. At the moment there is no way to check if the drivers are enabled or not so if you aren't sure then just click the enable button anyway.

Next, you will need to click on the 'Access Point' tab. From here select how many seconds to run a scan for (default is 5) and click the scan button. Make sure the WEP button is highlighted to show only WEP networks. Select your desired target and click the "Start Packet Capture" button. This will load airodump in an xterm. Be sure to leave this window open until you are ready to crack.

Now you must click the "Authenticate" button to attempt to authenticate with the network, which will allow you to perform packet injection. This will launch a new xterm which will display information about your authentication request. If you see a line similar to "AID 1 :-)" then all is good. If not, try changing your mac address to the same as an already authenticated client (you can see them at the bottom of the airodump xterm). Bear in mind that changing your mac requires the stopping and starting of your interface and it WILL close your airodump window

Once authenticated, click the "Injection" button, this will launch a new xterm and start listening for ARP and ACK packets. As soon as a ARP packet is captured it SHOULD start re-injecting it at about 500pps (packets per second). At this point the number of ARP requests should start to skyrocket! If injection starts but the ARP number remains static, it means you need to authenticate with the router. Leave the authentication and injection windows open.

To check how many IVs you have successfully captured, click on the "Decryption" tab, and select your current CAP file from the list. This will be the name of the network and a number. Now click the "Decrypt" button. It will load aircrack in a new xterm and after reading the packets it will display how many IVs have been captured and attempt to crack the key. You will normally need at least 50,000 IVs in order to perform a successful decryption, so if it is much less than this then you may as well close this window.

Once you are ready to crack, press the decrypt button and if you have enough IVs, the password should be broken in seconds. At this point the aircrack xterm will close and you can view the key by selecting it from the list and clicking the "Show Key" button. If it doesn't show up, just press the "Refresh" button. (Keys are also stored in your MyDocs/FAS/keys/ directory).

If all went well then the whole process should take around 8-15 minutes.
 

The Following 2 Users Say Thank You to munkiii For This Useful Post:
backstabber8's Avatar
Posts: 11 | Thanked: 0 times | Joined on Feb 2011 @ Malaysia & Indonesia
#323
Originally Posted by Switch_ View Post
Initiation Vectors. Each of them carries a tiny portion of the key. Enable packet injections and wait for the quantity of ACK's to skyrocket - once you have 50,000 then try to decrypt.
tQ bro ... it done..
 
Posts: 182 | Thanked: 84 times | Joined on Jul 2010 @ Jordan
#324
Originally Posted by FRuMMaGe View Post
Sorry guys its working 100%.

If I could reproduce the problem then I could have a go at sorting it.

Is it all networks or just certain ones?
lsn i have found something cool
CRUNCH
i am using it know on my laptop

crunch 10 10 1234567890 -t 07@@@@@@@@ | aircrack-ng -b 00:18:F8:F1: D2: D9 -w - /root/wpa/linksys-01.cap

this command to crack mobile phone no. u can change the 07 with area code or anything u want where
( 10 10 ) min length & max length
@ = variable
-w - ( cap file path )

if we can use crunch on n900 throw faircrack 0.4 that will be awesome ryt ?
u can also try alpha or all (symbol+alpha+numbers )

crunch download link


using this thread


i hope that if u can put crunch into faircrack

Last edited by fatcobrah; 2011-02-02 at 17:33.
 
Posts: 1,463 | Thanked: 1,916 times | Joined on Feb 2008 @ Edmonton, AB
#325
Originally Posted by shockgiga View Post
i remember getting a -20 infraction just by requesting this app a few months back. and getting all sorts of edited tags like "idiot post etc.". what a turn out? LOL
Well, this IS for idiots. No offense intended to anyone here. I mean, like those people that buy "computers for dummies" books. It's designed to make a task that normally requires some knowledge so simple that anyone can click a button and do it. Normally, this is a good thing, and I'm happy if it brings lxp some more donations, but creating software to automate potentially illegal activities is really hard to support. This isn't a hacker support forum, we don't want to know what you're doing with this, and we don't want to answer questions that are not directly related to this script itself.
This thread and the others related to wifi injection have already become gong shows.
At least half of the posts related to this stuff is from people that don't have a clue what is going on, and are too lazy to do any research or just don't understand what they're reading. Also, they have way too high expectations.
Anyways, my point is, if you were told NOT to ask for apps like this, it's just that someone had the foresight to see this mess. I won't personally use this script because I can run other more advanced ones from the command line, but that doesn't mean I don't respect the author's work. What I don't like is all the questions people ask, unrelated to the GUI. "what is an IV"? GTFO. Seriosuly, if you guys can't stop asking stuff like that, everyone is going to run out of patience very soon. I am sorry if you have trouble running this due to a lack of linux knowledge, but this thread should be limited to feature requests and bug reports, and you guys should learn to use the command line tools so you actually can appreciate this script and others like it.
 

The Following 8 Users Say Thank You to Creamy Goodness For This Useful Post:
FRuMMaGe's Avatar
Posts: 330 | Thanked: 483 times | Joined on Dec 2010 @ Norwich, UK
#326
Originally Posted by SalmanAbbas View Post
Are WPA and WPA2 the same?
No, but they can both be cracked by the same method.

Originally Posted by SalmanAbbas View Post
mine cannot find the package john through xterm!

PS i typed apt-get install john

any ideas?
Enable the extras-devel repo

Originally Posted by backstabber8 View Post
"IVs" stand for?

what should i do?
Initialization Vectors. Read the first post

@Creamy Goodness.

You have pretty much summed this thread up.
__________________
OMNOM: Pacman-like game now in extras-devel

fAircrack (Aircrack GUI): Point-and-click pwnage for your N900
Now with John the Ripper integration

Last edited by FRuMMaGe; 2011-02-02 at 18:47.
 
Switch_'s Avatar
Posts: 601 | Thanked: 549 times | Joined on Mar 2010 @ Redditch, UK
#327
Originally Posted by FRuMMaGe View Post
@Creamy Goodness.

You have pretty much summed this thread up.
Bang on the money. The GTFO reference is one of the best I've seen on TMO, I'm sick of people whining and moaning because they haven't taken the time to go and read up, learn and try to find out for themselves. FRuMMaGe's GUI for cracking wireless networks is all script based and the people here are lucky that he's had the decency to put it into a GUI so that it can be used by the masses for checking their own WiFi network security, but seriously, if all you want to do is hack other peoples wireless networks then I don't see any reason why you should be supported in that endeavour.

Go and read up yourself.

/rant
__________________
---<|| Alt + F4 for GOD MODE ||>---
---<|| Deviant Art Linky Linky ||>---
 
Posts: 25 | Thanked: 1 time | Joined on Aug 2010
#328
i found a program in window call fscrack...
basically, it's just a GUI for john the ripper for windows..
my problem is, i cannot seem to figure a way to use it to decrypt my wpa.cap file because it only can decrypt .hash file...
so, how to force it to decrypt .cap file because i know that that we can use john the ripper in fAircrack to decrypt the cap file?? ..

Somebody????
 
Posts: 87 | Thanked: 4 times | Joined on Sep 2010
#329
it's work or not?
 
Posts: 25 | Thanked: 1 time | Joined on Aug 2010
#330
Originally Posted by colla84 View Post
it's work or not?
what do you mean????
 
Reply

Tags
aircrack, aircrack-ng, epicfacepalm, pen testing, rtfm dude!

Thread Tools

 
Forum Jump


All times are GMT. The time now is 08:46.