|
2011-03-06
, 09:01
|
Posts: 102 |
Thanked: 23 times |
Joined on Nov 2009
@ Finland
|
#592
|
18:18:20 Sending Authentication Request 18:18:20 Authentication successful 18:18:20 Sending Association Request 18:18:20 Association successful :-)
aireplay-ng -0 1 -a 00:14:6C:7E:40:80 -c 00:0F:B5:AE:CE:9D wlan0
|
2011-03-06
, 09:38
|
Posts: 156 |
Thanked: 18 times |
Joined on Feb 2010
|
#593
|
Fake authentication is used when u cant get succesful authentication/association request from AP when you press authenticate button from faircrack, succesful:
.. Is there any traffic on the AP you are trying to crack? I have my self one AP i tried to crack with noCode:18:18:20 Sending Authentication Request 18:18:20 Authentication successful 18:18:20 Sending Association Request 18:18:20 Association successful :-)
result as there was absolutely no traffic. If there is a client connected to the AP, you can try to deauthenticate the current client. This also is a good method for getting ARP's, but only works if you have client connected!
deauthenticate:
Where:Code:aireplay-ng -0 1 -a 00:14:6C:7E:40:80 -c 00:0F:B5:AE:CE:9D wlan0
* -0 means deauthentication
* 1 is the number of deauths to send (you can send multiple if you wish)
* -a 00:14:6C:7E:40:80 is the MAC address of the access point
* -c 000:0F:B5:AE:CE:9D is the MAC address of the client you are deauthing
* wlan0 is the interface name
!!!You should really read this!!!
|
2011-03-06
, 09:50
|
Posts: 102 |
Thanked: 23 times |
Joined on Nov 2009
@ Finland
|
#594
|
dude! i read tht. . i tried connectin my pc. ps3 psp to the ap n the arps shoot up bu only for lik 3 seconds. . where do i type the deaunthication code? in xterm?
ive been facepamming my head for over a week! so plz understand!
thks n cheers. .
aireplay-ng -0 1 -a ‹MAC address of AP› -c ‹MAC address of the client› wlan0
The Following User Says Thank You to teemui For This Useful Post: | ||
|
2011-03-06
, 15:00
|
Posts: 156 |
Thanked: 18 times |
Joined on Feb 2010
|
#595
|
|
2011-03-06
, 15:13
|
Posts: 102 |
Thanked: 23 times |
Joined on Nov 2009
@ Finland
|
#596
|
success!!!!!!!!!!!!! i did it guys!!!! i mean after 4 days of continous face palming!!!!!!!!! i did it!!!
ok on problem though, when i use the wep key i got after decryption (finally!!!) i tried it n got the error failed to connect. . could nt retrive ip address n the wep key maybe incorrect!!!
thts when i did the mega facepalm!!!
The Following User Says Thank You to teemui For This Useful Post: | ||
|
2011-03-06
, 18:24
|
|
Posts: 330 |
Thanked: 483 times |
Joined on Dec 2010
@ Norwich, UK
|
#597
|
The Following User Says Thank You to FRuMMaGe For This Useful Post: | ||
|
2011-03-06
, 19:23
|
Posts: 156 |
Thanked: 18 times |
Joined on Feb 2010
|
#598
|
|
2011-03-06
, 20:26
|
|
Posts: 855 |
Thanked: 612 times |
Joined on Oct 2010
@ Germany
|
#599
|
|
2011-03-07
, 05:24
|
Posts: 102 |
Thanked: 23 times |
Joined on Nov 2009
@ Finland
|
#600
|
Tags |
aircrack, aircrack-ng, epicfacepalm, pen testing, rtfm dude! |
Thread Tools | |
|
thks