Haider
|
2011-01-21
, 12:07
|
Posts: 131 |
Thanked: 104 times |
Joined on Dec 2010
|
#51
|
|
2011-01-21
, 12:48
|
|
Posts: 330 |
Thanked: 483 times |
Joined on Dec 2010
@ Norwich, UK
|
#52
|
Successfully obtained my WEP...
Now learning how to Bruteforce WPA/WPA2...
Huhuhuhuhu.....Keep up the Excellent work...
Thank youuuuu....^.^
Just to verify my steps for bruteforcing my WPA/WPA2...
sh fas.sh
i choose 3 (load)
Then 1 (Enable)
Then 2 (Scan Ap)
Then 4 (brutefoce)
Then 3 Choose Dictionary
Then i enter (test.txt)
Then I choose 2 (Specify Cap)
Then it open a New Window and close it immediately...
It brings me back to the mainmenu.. (1-5)
There is no option to inject or authenticate with client like cracking the WEP...
Did i miss something here?
^.^""
Sorry...
Also...during Deauthentication...
I should enter
(AP MAC) (MYPC MAC) INTERFACE (wlan0)
Right?
How to install it. When I type the first command it says cannot create mkdir. Can you explain it. I am a nooby.
mkdir /home/user/MyDocs/FAS/ cd /home/user/MyDocs/FAS/ mkdir cap mkdir diction mkdir keys tar -xzvf /home/user/MyDocs/fas.tar.gz .
The Following User Says Thank You to FRuMMaGe For This Useful Post: | ||
|
2011-01-21
, 13:06
|
Posts: 55 |
Thanked: 4 times |
Joined on Jun 2010
|
#53
|
|
2011-01-21
, 13:43
|
|
Posts: 330 |
Thanked: 483 times |
Joined on Dec 2010
@ Norwich, UK
|
#54
|
I get it now...So means after i select which AP to crack and after i input the:
(Ch) (Ap Mac) (filename)
I just wait or De-authenticate...correct?
So once i i see the handshake...Then i can start bruteforcing it...
ill test it right away...hehehe...
oh yea...and the Mac to deauthenticate...the connected mac is at the bottom of the screen rite?
as for the cannot mkdir..is the folder already there??? I think i got the same error last time....but at the end i check my folder..its already created...Try check if the folder is already created or not...
Instead of creating the folder from X-term you can also manually create it at the file manager right?
The Following User Says Thank You to FRuMMaGe For This Useful Post: | ||
|
2011-01-21
, 13:53
|
Posts: 55 |
Thanked: 4 times |
Joined on Jun 2010
|
#55
|
|
2011-01-21
, 14:14
|
|
Posts: 330 |
Thanked: 483 times |
Joined on Dec 2010
@ Norwich, UK
|
#56
|
I suck at queenbeecon script....hahahai mainly rely on the beecon exports...Hehehehe....
I did my testing....could not see the handshake notification...or am i looking at the correct window?
|
2011-01-21
, 14:32
|
Posts: 55 |
Thanked: 4 times |
Joined on Jun 2010
|
#57
|
|
2011-01-21
, 14:38
|
|
Posts: 330 |
Thanked: 483 times |
Joined on Dec 2010
@ Norwich, UK
|
#58
|
Here is my Screenshot...can i know where its gonna appear?
and when i try to bruteforce the cap...it says (0 Handshake)
then it auto close the terminal...
The Following User Says Thank You to FRuMMaGe For This Useful Post: | ||
|
2011-01-21
, 14:48
|
Posts: 55 |
Thanked: 4 times |
Joined on Jun 2010
|
#59
|
|
2011-01-21
, 15:06
|
|
Posts: 330 |
Thanked: 483 times |
Joined on Dec 2010
@ Norwich, UK
|
#60
|
Ohhh... i see...hmmm...maybe i missed a step somewhere...but i dont think so....lemme racall it...
1. Enter WPA Mode
2. Load Injection Driver
3. Enter Monitor Mode
4. Scan AP
5. Enter Ap Channel, Mac and Filename
6. Wait for it to handshake...(this where i waited and tested for 1 hour) Also sucessfully deauthenthicate my lappie...but i still dont see the handshake notification)
7. Select bruteforce
8. Enter Dictionary File
9. Select Cap (then the status is reading the cap files, while there is a Status (0 Handshake)
10. Throw me out at the WPA menu again...
@.@""
Thanks for all the tutorial and help....really appreciate it.... achieved something new, at least success on the WEP...now the WPA/WPA2 only...
oh yea...if you're free...can include the Widget as well on the mainpage?
^.^
[queen-beecon-header] version=1.000000 checksum=2788276 [queen-beecon-exported-instance] widgetType=1 widgetVisible=1 operationalStatus=0 hideCanvas=false hideClickCanvas=false snippetBgRGB=0 snippetExtBgRGB=#627500000000 beecon_lt0_ImgZoom=0 beecon_lt0_BgRGB=2 beecon_lt0_ExtBgRGB=#64a500000000 beecon_lt0_ImgFilename=queen-beecon-appok.png beecon_eq0_ImgZoom=0 beecon_eq0_BgRGB=3 beecon_eq0_ExtBgRGB=#65bd00000000 beecon_eq0_ImgFilename=queen-beecon-appok.png beecon_eq1_ImgZoom=0 beecon_eq1_BgRGB=4 beecon_eq1_ExtBgRGB=#ffffffff0000 beecon_eq1_ImgFilename=queen-beecon-appwrn.png beecon_ge2_ImgZoom=0 beecon_ge2_BgRGB=5 beecon_ge2_ExtBgRGB=#ffff00000000 beecon_ge2_ImgFilename=queen-beecon-apperr.png beecon_idxge2_ImgZoom=0 beecon_idxge2_BgRGB=11 beecon_idxge2_ExtBgRGB=#0000ffffffff beecon_idxge2_ImgFilename=queen-beecon-index.png widWidth=147.70642201834863 widHeight=64.264705882352942 instanceTitle=Aircrack instanceCmd=osso-xterm -e "sh /home/user/MyDocs/FAS/fas.sh" rememberMe= cmdImgFilename=queen-beecon-appok.png cmdImgAngle=0 cmdImgZoom=11 cmdFgRGB=1 cmdExtFgRGB=#ffffffffffff cmdTextAngle=0 cmdVisibilityPosition=5 cmdImgVisibilityPosition=5 cmdJustify=0 cmdExtFont=Nokia Sans bold italic 18 cmdFontName=3 cmdFontSize=12 resImgFilename=queen-beecon-appok.png resImgAngle=0 resImgZoom=0 resFgRGB=1 resExtFgRGB=#ffffffffffff resTextAngle=0 resVisibilityPosition=0 resImgVisibilityPosition=5 resJustify=0 resExtFont=Nokia Sans bold 12 resFontName=2 resFontSize=12 progressAnimationFrames=4 progressAnimationTimer=0 progressAnimationPos=4 progressAnimationAtClickXY=false progressAnimationBasename=queen-beecon-progress updOnStartup=false updOnClick=true updOnDesktop=false updOnSight=false delayIndex=0 customIntervalSecs=0 updNeworkPolicy=0 updOnDBUS=0 updOnDBUSBus=0 updOnDBUSMatchRule=
The Following User Says Thank You to FRuMMaGe For This Useful Post: | ||
Tags |
crack it, frummage rocks!, noobparty |
Thread Tools | |
|