Notices


Reply
Thread Tools
StefanL's Avatar
Posts: 298 | Thanked: 341 times | Joined on Aug 2010 @ This world :)
#821
Originally Posted by q6600 View Post
The original version is slow to detect ap , 0.41 is instant to discover ap, and in 7 min i was able to get 80k ivs, try to decrypt was instant
Not sure this can be credited to fAircrack, since it is only a ui for using the aircrack programs. All I did is streamline some of the code in the scripts and the ui. Anyway, it is good to hear from happy customers.
__________________
My phone evolution: Nokia 7610 (RIP), N82 (RIP), BB9000 (RIP), N900, BB9760 (RIP), N8, BB9900, N9 64GB
Working : Python Gorillas (Maemo5) Faircrack0.50 Update (Maemo5)
Not so much : WPScrack (Maemo5)
 
StefanL's Avatar
Posts: 298 | Thanked: 341 times | Joined on Aug 2010 @ This world :)
#822
Originally Posted by anapospastos View Post
Because I couldnt find the ascii code. I finally solved it and first wep key cracked
Good to hear you solved it. These threads are used for sharing solutions .
__________________
My phone evolution: Nokia 7610 (RIP), N82 (RIP), BB9000 (RIP), N900, BB9760 (RIP), N8, BB9900, N9 64GB
Working : Python Gorillas (Maemo5) Faircrack0.50 Update (Maemo5)
Not so much : WPScrack (Maemo5)
 
Posts: 738 | Thanked: 179 times | Joined on Mar 2010 @ Gold Coast, Australia
#823
Originally Posted by StefanL View Post
Trine provides the command here not sofar back in the thread :
http://talk.maemo.org/showpost.php?p...&postcount=762

Easiest way to find the attached clients bssid is to capture packets, any attached clients are shown there on the packet capture xterm screen.

Since you are already capturing packets, open another xterm (CTRL-Shift-X) to deauth the attached client and you should be able to capture the handshake.
Thanks heaps for your reply, now i just have a question

Here is the code right
aireplay-ng -0 2 -a 00:11:22:33:44:55 -c 99:88:77:66:55:44 wlan0

But what is the actual code and what is the bssid?

To me that looks like two mac address one before the -a and one after -c?

Thanks if you could help me with that.


Now another thing, Which page is the instructions on that shows steps to install faircrack 0.4.1..

Thanks in Advance
 
Posts: 738 | Thanked: 179 times | Joined on Mar 2010 @ Gold Coast, Australia
#824
Im Assuming the first bssid that shows up when i click capture packets, is the bssid of the actuall router? when another bssid shows up under it its the same as the bssid above but there now is a station bssid which one do i use i tried the same bssid for -a and -c and i think i kicked off the router as it dissapeared and came back
 
pusak gaoq's Avatar
Posts: 723 | Thanked: 519 times | Joined on Nov 2010 @ Kuching:Malaysia
#825
Originally Posted by lucas777 View Post
Thanks heaps for your reply, now i just have a question

Here is the code right
aireplay-ng -0 2 -a 00:11:22:33:44:55 -c 99:88:77:66:55:44 wlan0
the first bssid (00:11:22:33:44:55) is the router that you want to cracked & the second bssid (99:88:77:66:55:44) is the mac address that currently connected to that router....
the code above is for you to deauthenticated the second bssid from the main router to make it try to reconnect again & again to the router...this reconnections will give give plenty of data while capturing the router for WEP cracking or capturing WPA handshake...
 
Posts: 13 | Thanked: 8 times | Joined on Oct 2010
#826
Originally Posted by lucas777 View Post
Thanks heaps for your reply, now i just have a question

Here is the code right
aireplay-ng -0 2 -a 00:11:22:33:44:55 -c 99:88:77:66:55:44 wlan0

But what is the actual code and what is the bssid?

To me that looks like two mac address one before the -a and one after -c?

Thanks if you could help me with that.


Now another thing, Which page is the instructions on that shows steps to install faircrack 0.4.1..

Thanks in Advance
aireplay-ng -0 2 -a 00:11:22:33:44:55 -c 99:88:77:66:55:44 wlan0

aireplay-ng -0 tells aireplay-ng to send deauth packets
2 tells aireplay-ng the number of times to attempt deauth
-a is the mac address of the AP you attack
-c is the mac address of the client you want to deauth
wlan0 is the name of the wireless iface of your phone
 
Swirnoff's Avatar
Posts: 162 | Thanked: 20 times | Joined on Oct 2009 @ California
#827
Originally Posted by jim_voy View Post
Can anyone tell me, what approximate distance should it be in cracking wep/wpa keys?
anything under -80dB should be suitable for cracking
 
Posts: 529 | Thanked: 194 times | Joined on Aug 2010 @ UK
#828
For all thou having trouble working things out check out these tutorials

many thanks
__________________
METASPLOIT INSTALL N900
Keep the forums clean
Dont forget to say thanks

Last edited by stevomanu; 2011-06-15 at 09:18.
 
StefanL's Avatar
Posts: 298 | Thanked: 341 times | Joined on Aug 2010 @ This world :)
#829
Originally Posted by lucas777 View Post
Now another thing, Which page is the instructions on that shows steps to install faircrack 0.4.1..

Thanks in Advance
Check my signature, link has been fixed now
__________________
My phone evolution: Nokia 7610 (RIP), N82 (RIP), BB9000 (RIP), N900, BB9760 (RIP), N8, BB9900, N9 64GB
Working : Python Gorillas (Maemo5) Faircrack0.50 Update (Maemo5)
Not so much : WPScrack (Maemo5)

Last edited by StefanL; 2011-06-15 at 10:43.
 
Posts: 738 | Thanked: 179 times | Joined on Mar 2010 @ Gold Coast, Australia
#830




Does this look right? the ssid under where it says station is that thw clients ssid? i ran the deauth but it doesnt seem to kick them?

Where am i going wrong?
 
Reply

Tags
aircrack, aircrack-ng, epicfacepalm, pen testing, rtfm dude!

Thread Tools

 
Forum Jump


All times are GMT. The time now is 01:56.