Active Topics

 



Notices


Reply
Thread Tools
Posts: 29 | Thanked: 27 times | Joined on Mar 2010
#11
Turns off the wifi adapter,
Puts the wifi adapter into a listening mode that won't transmit packets, but will instead enable reading of packets for a particular channel,
Turn wifi adapter back on,
Then run the aireplay program performing a test.
The test runs through checking if packet injection will work.

Attack modes:

-0 <count>, --deauth=<count>
This attack sends deauthentication packets to one or more clients which are currently associated with a particular access point. Deauthenticating clients can be done for a number of
reasons: Recovering a hidden ESSID. This is an ESSID which is not being broadcast. Another term for this is "cloaked" or Capturing WPA/WPA2 handshakes by forcing clients to reau‐
thenticate or Generate ARP requests (Windows clients sometimes flush their ARP cache when disconnected). Of course, this attack is totally useless if there are no associated wire‐
less client or on fake authentications.

-1 <delay>, --fakeauth=<delay>
The fake authentication attack allows you to perform the two types of WEP authentication (Open System and Shared Key) plus associate with the access point (AP). This is useful is
only useful when you need an associated MAC address in various aireplay-ng attacks and there is currently no associated client. It should be noted that the fake authentication
attack does NOT generate any ARP packets. Fake authentication cannot be used to authenticate/associate with WPA/WPA2 Access Points.

-2, --interactive
This attack allows you to choose a specific packet for replaying (injecting). The attack can obtain packets to replay from two sources. The first being a live flow of packets from
your wireless card. The second being from a pcap file. Reading from a file is an often overlooked feature of aireplay-ng. This allows you read packets from other capture sessions or
quite often, various attacks generate pcap files for easy reuse. A common use of reading a file containing a packet your created with packetforge-ng.

-3, --arpreplay
The classic ARP request replay attack is the most effective way to generate new initialization vectors (IVs), and works very reliably. The program listens for an ARP packet then
retransmits it back to the access point. This, in turn, causes the access point to repeat the ARP packet with a new IV. The program retransmits the same ARP packet over and over.
However, each ARP packet repeated by the access point has a new IVs. It is all these new IVs which allow you to determine the WEP key.

-4, --chopchop
This attack, when successful, can decrypt a WEP data packet without knowing the key. It can even work against dynamic WEP. This attack does not recover the WEP key itself, but
merely reveals the plaintext. However, some access points are not vulnerable to this attack. Some may seem vulnerable at first but actually drop data packets shorter that 60 bytes.
If the access point drops packets shorter than 42 bytes, aireplay tries to guess the rest of the missing data, as far as the headers are predictable. If an IP packet is captured, it
additionally checks if the checksum of the header is correct after guessing the missing parts of it. This attack requires at least one WEP data packet.

-5, --fragment
This attack, when successful, can obtain 1500 bytes of PRGA (pseudo random generation algorithm). This attack does not recover the WEP key itself, but merely obtains the PRGA. The
PRGA can then be used to generate packets with packetforge-ng which are in turn used for various injection attacks. It requires at least one data packet to be received from the
access point in order to initiate the attack.

-6, --caffe-latte
In general, for an attack to work, the attacker has to be in the range of an AP and a connected client (fake or real). Caffe Latte attacks allows to gather enough packets to crack a
WEP key without the need of an AP, it just need a client to be in range.

-7, --cfrag
This attack turns IP or ARP packets from a client into ARP request against the client. This attack works especially well against ad-hoc networks. As well it can be used against sof‐
tAP clients and normal AP clients.

-9, --test
Tests injection and quality.
 
Posts: 29 | Thanked: 27 times | Joined on Mar 2010
#12
And unless neopwn pulls out some magic from a hat, packet injection is unsuccessful on the n900 currently. So you would not be able to 'crack' some wep, or send de'auth packets for wap.
You could listen to open networks.
(I don't own n900 yet, will 2mrw, but I read these forums enough to know)

If you wanted to learn, google 'backtrack', then google 'backtrack tutorials - getting started', then spend time on their beginner forums, then read up on the flaws of WEP, aka why is it possible.
DO NOT WEP CRACK YOUR NEIGHBOURS!!!


Last edited by raven; 2010-06-22 at 08:29.
 

The Following User Says Thank You to raven For This Useful Post:
Posts: 7 | Thanked: 2 times | Joined on Jun 2010
#13
i just saw that some guy is posted a step by step crack method in one of the forums i think q6600 was the nick ... he also says that injection ins't working but if you have a device connected ... bla bla bla you will be able to do it ... bla bla bl a is a bad english ... i just don't know the words... so is it posible ???
 
dchky's Avatar
Posts: 549 | Thanked: 299 times | Joined on Jun 2010 @ Australian in the Philippines
#14
At the moment, no, it's not possible using only the N900.

Edit: You can do it if you have a compatible USB WiFi stick + USB Host mode and cables + drivers.

Last edited by dchky; 2010-06-22 at 13:01.
 
Posts: 146 | Thanked: 39 times | Joined on May 2010
#15
Originally Posted by dchky View Post
At the moment, no, it's not possible using only the N900.

Edit: You can do it if you have a compatible USB WiFi stick + USB Host mode and cables + drivers.
well i manage to crack my wep key only with my n900 ( the injection is not working but if you have a high trafic is posible)
you dont need nothing but the n900
 
Posts: 146 | Thanked: 39 times | Joined on May 2010
#16
Originally Posted by menthor View Post
i just saw that some guy is posted a step by step crack method in one of the forums i think q6600 was the nick ... he also says that injection ins't working but if you have a device connected ... bla bla bla you will be able to do it ... bla bla bl a is a bad english ... i just don't know the words... so is it posible ???
you din't get it
you need a router and a pc conected to that router ( with hight trafic ) in order to crack a wep key.
 
christexaport's Avatar
Posts: 1,589 | Thanked: 720 times | Joined on Aug 2009 @ Arlington (DFW), Texas
#17
Originally Posted by q6600 View Post
well i manage to crack my wep key only with my n900 ( the injection is not working but if you have a high trafic is posible)
you dont need nothing but the n900
can you share a link to your guide?
__________________
Maemo-Freak.com
"...and the Freaks shall inherit the Earth."
 
Posts: 2,829 | Thanked: 1,459 times | Joined on Dec 2009 @ Finland
#18
btw.
Currently there is wlan driver that has injection working.
http://talk.maemo.org/showthread.php?t=67554
__________________
TMO links: [iSpy] - [Power search] - [Most thanked] - [Cordia - Maemo5 UI on top MeeGo Core] - [CommunitySSU]
 
Posts: 13 | Thanked: 0 times | Joined on Aug 2012 @ Italy, Spain
#19
LOL. Exactly


Originally Posted by willi_iam View Post
I don't think, that anyone will provide a step-by-step tutorial "how to hack your neighbours WiFi" in this forum...

Those who want to crack, must be willing to read docs...

In other words:
RTFM, you have to, young padavan... :P
 
Reply


 
Forum Jump


All times are GMT. The time now is 15:36.