![]() |
2011-06-30
, 22:01
|
Posts: 268 |
Thanked: 75 times |
Joined on Jan 2011
|
#922
|
![]() |
2011-07-03
, 12:15
|
|
Posts: 1,103 |
Thanked: 368 times |
Joined on Oct 2010
@ india, indore
|
#923
|
![]() |
2011-07-03
, 12:25
|
Posts: 529 |
Thanked: 194 times |
Joined on Aug 2010
@ UK
|
#924
|
The Following User Says Thank You to stevomanu For This Useful Post: | ||
![]() |
2011-07-03
, 12:29
|
|
Posts: 1,103 |
Thanked: 368 times |
Joined on Oct 2010
@ india, indore
|
#925
|
![]() |
2011-07-03
, 12:30
|
|
Posts: 1,648 |
Thanked: 2,122 times |
Joined on Mar 2007
@ UNKLE's Never Never Land
|
#926
|
The Following User Says Thank You to Saturn For This Useful Post: | ||
![]() |
2011-07-03
, 12:34
|
|
Posts: 1,103 |
Thanked: 368 times |
Joined on Oct 2010
@ india, indore
|
#927
|
![]() |
2011-07-03
, 12:41
|
|
Posts: 1,103 |
Thanked: 368 times |
Joined on Oct 2010
@ india, indore
|
#928
|
you need these four packages:
python2.5
python2.5-qt4-gui
python2.5-qt4-core
python2.5-qt4-maemo5
![]() |
2011-07-03
, 12:46
|
|
Posts: 1,103 |
Thanked: 368 times |
Joined on Oct 2010
@ india, indore
|
#929
|
![]() |
2011-07-03
, 15:29
|
Posts: 72 |
Thanked: 2 times |
Joined on Sep 2010
|
#930
|
![]() |
Tags |
aircrack, aircrack-ng, epicfacepalm, pen testing, rtfm dude! |
Thread Tools | |
|
Also, i would like to mention that some instructions from post 1 are incorrect. Yea, i know that this were mentioned many times before, but not in "concluded" form, so i post this here, to avoid another 213424 posts about injection not working:
1. Fake authentication doesn't create ARP. It creates ACK, but that doesn't help You. If You used "injection" (or manually aireplay-ng) and captured ARP, then You re-send it with MAC set to same as client, from whom You captured ARP, access point will accept them.
2. AFAIK the only real usage of fake auth on fAircrack (considering options that are possible now using GUI) is to check if access point got MAC filtering. It won't generate any ARP to replay - as stated in point 1 - at best it can make collecting IV's little easier (on some routers), but I'm not 100% sure about that. But, they're not skyrocketing, by any means.
3. On most situations, ARP is generated only, when new client authenticate to router by "legal" way (no fake auth), So, only possible solution to generate ARP on demand (to re-inject it) is just like with WPA handshake - force client to deauth. I've tested it countless times, with every possible configuration, and only deauthenticating client, while already running aireplay-ng (we're talking about using fAircrack GUI), generate ARP and start re-injecting it. Without that, You must wait quietly until someone connect to given router. Keep in mind, that powersaving idle features of wlan cards != deauthentication. Such a machine is still connected and authenticated, but traffic is suspended to almost 0. Same apply for our precious IVs
As for now, deauthentication doesn't want to work in fAircrack, so You must google correct syntax to use it from terminal
---
Correct me if I'm wrong, but aireplay-ng activated via fAircrack work only in real time, i.e. all ARP's captured are lost when we close injection window? It would be great to add possibility to store them for future. It's little annoying, if You have to run everything from terminal, if You want to catch ARP and use it on hour better suiting Your needs.
Maybe they should be stored under "decrypt" tab, just as caps and keys, keeping them as default, then deleting on demand? Would be great if name contains not only AP ssid, but also MAC of client whom ARP was originated. Then, on "Access Point" page, we would have another button, called "injection via stored ARP".
What do You think, StefanL?
//Edit
As for repos and maintaining, I would love to help, but I'm as clueless as You
Mentalist Traceur gone much further and he's already maintaining aircrack-ng package - I'm 100% sure that he will be glad to help, thought.
Last edited by Estel; 2011-06-30 at 13:59.