|
2011-02-11
, 18:47
|
|
Posts: 330 |
Thanked: 483 times |
Joined on Dec 2010
@ Norwich, UK
|
#442
|
Ah! Yes! I remember - That's the classic case of the forgetful *****!
Thanks Mate!
Me thinks me will stick with WEP!
Thanks!
|
2011-02-11
, 19:23
|
Posts: 25 |
Thanked: 1 time |
Joined on Aug 2010
|
#443
|
|
2011-02-11
, 19:28
|
|
Posts: 330 |
Thanked: 483 times |
Joined on Dec 2010
@ Norwich, UK
|
#444
|
FRuMMaGe,,
recently i just tried to test hack my wpa wifi...
i had succesfully capture handshake....
then i transfer the cap file to my pc and use cowpatty to crack it..
but i get this error
.........................................
incomplete tkip four-way exchange
.........................................
and it tell me to get another cap file..
so i go and get another cap using using my n00 as before, but it still saying that error..
please help me..
The Following User Says Thank You to FRuMMaGe For This Useful Post: | ||
|
2011-02-11
, 19:43
|
Posts: 25 |
Thanked: 1 time |
Joined on Aug 2010
|
#445
|
Which version of aicrack is on your computer? Does the WPA decrypt correctly in fAircrack?
|
2011-02-11
, 20:32
|
|
Posts: 330 |
Thanked: 483 times |
Joined on Dec 2010
@ Norwich, UK
|
#446
|
no..i don't have aircrack because i'm using windows 7..
futhermore, i don't think i need aircrack to use cowpatty for windows..
i'm just ran packet capture from faircrack to my wpa wireless..then, after a got wpa handshake on the right corner of xterm, i transfer the .cap file to my windows and start cracking using cowpatty....
but why it said that "incomplete TKIP four-way exchange. Try using a different capture"....
so, i try google my problem and i found this....
........................
When you filter the EAPOL handshakes in the WireShark, you will see that they all originate from the client and go TO the AP. There are none FROM the AP. IE You only have 50% of conversation. That is why aircrack-ng says you have no WPA handshakes.
As well, if you look at the packets in the two captures, you will see that it really only the client packets going to the AP, not the reverse.............
..................................
unfortunately, i don't understand what it mean....
The Following User Says Thank You to FRuMMaGe For This Useful Post: | ||
|
2011-02-11
, 20:58
|
Posts: 25 |
Thanked: 1 time |
Joined on Aug 2010
|
#447
|
|
2011-02-12
, 10:23
|
Posts: 28 |
Thanked: 14 times |
Joined on Sep 2010
|
#448
|
FRuMMaGe,,
recently i just tried to test hack my wpa wifi...
i had succesfully capture handshake....
then i transfer the cap file to my pc and use cowpatty to crack it..
but i get this error
.........................................
incomplete tkip four-way exchange
.........................................
and it tell me to get another cap file..
so i go and get another cap using using my n00 as before, but it still saying that error..
please help me..
The Following 2 Users Say Thank You to littlebadger For This Useful Post: | ||
|
2011-02-12
, 15:07
|
Posts: 25 |
Thanked: 1 time |
Joined on Aug 2010
|
#449
|
in case you have 4.6 later version, try cowpatty with -2 option:
-2 Use frames 1 and 2 or 2 and 3 for key attack (nonstrict mode)
|
2011-02-13
, 07:51
|
Posts: 28 |
Thanked: 14 times |
Joined on Sep 2010
|
#450
|
The Following User Says Thank You to littlebadger For This Useful Post: | ||
Tags |
aircrack, aircrack-ng, epicfacepalm, pen testing, rtfm dude! |
Thread Tools | |
|
Thanks Mate!
Me thinks me will stick with WEP!
Thanks!
The thanks button? Sure! You can press it! I would!