Active Topics

 



Notices


Reply
Thread Tools
James_Littler's Avatar
Posts: 820 | Thanked: 436 times | Joined on May 2010 @ Portsmouth, UK.
#91
Originally Posted by kingoddball View Post
A question for all users who have experience:
To me it seems it's virtually impossible to crack WPA/WPA2 IF we do not have the password in a bruteforce dictionary?

i.e: MY password is not a word and it includes numbers..

It would be near impossible to attack/gain access?

I think I should stick to WEP and forget WPA I think..
Look into John the Ripper, which I guess is the next thing the N900 needs.
__________________
JamesLittler.com | James Littler's Web, Print and Graphic Design Portfolio.
 

The Following User Says Thank You to James_Littler For This Useful Post:
FRuMMaGe's Avatar
Posts: 330 | Thanked: 483 times | Joined on Dec 2010 @ Norwich, UK
#92
Originally Posted by atilla View Post
if i push the decrypt button to know how many lV's i have the aircrack-ng window opens and straight after that closes.is this normal?
How long had you been capturing packets?

If you havent captured ANY IVs it will just exit immediately. I'll check when I'm home though.

Originally Posted by augustthe View Post
cool dude nice work, I got it working with out installing PYQT i crack my network under 4 min,I really like the gui it help a lot and very easy to use,I really appreciate all the work that you done on the gui and the script if a way i can donate i will.THANKS
Thank you that means a lot for you to say that. If I knew how to set up a donation page I would do it but as I don't then I'm sure lxp will enjoy a donation.

Without him none of this would be possible

Originally Posted by James_Littler View Post
Look into John the Ripper, which I guess is the next thing the N900 needs.
I had John integrated into my old script for Ubuntu. Is there a maemo version? If someone could port it I would be glad to implement it into fAircrack
__________________
OMNOM: Pacman-like game now in extras-devel

fAircrack (Aircrack GUI): Point-and-click pwnage for your N900
Now with John the Ripper integration
 

The Following User Says Thank You to FRuMMaGe For This Useful Post:
atilla's Avatar
Posts: 1,210 | Thanked: 597 times | Joined on Apr 2010 @ hamburg,germany
#93
even after 10 minutes it closes immediatly
if i try it to remove to do a fresh installation i get this:
Attached Images
 
__________________


Nobody likes us but we dont care....
 
FRuMMaGe's Avatar
Posts: 330 | Thanked: 483 times | Joined on Dec 2010 @ Norwich, UK
#94
Originally Posted by atilla View Post
even after 10 minutes it closes immediatly
if i try it to remove to do a fresh installation i get this:
You cant reinstall it because you need to revert to the stock osso-wlan that you changed during the installation of the bleeding edge drivers.

I tried to replicate your problem (aircrack closing instantly) but it's working fine for me. The only time it closes instantly was when I had not captured a single IV
__________________
OMNOM: Pacman-like game now in extras-devel

fAircrack (Aircrack GUI): Point-and-click pwnage for your N900
Now with John the Ripper integration
 

The Following User Says Thank You to FRuMMaGe For This Useful Post:
Posts: 136 | Thanked: 150 times | Joined on Dec 2010 @ Finland
#95
The AP tab scan seems to have a problem with blank ssid's.

It shows the details for the previously selected AP when you select the blank entry.
 

The Following User Says Thank You to mooglez For This Useful Post:
atilla's Avatar
Posts: 1,210 | Thanked: 597 times | Joined on Apr 2010 @ hamburg,germany
#96
maybe i should try it with a different w-lan.i just tried it with mine but maybe it just doesn't work for it.i try it tomorrow
__________________


Nobody likes us but we dont care....
 
Posts: 136 | Thanked: 150 times | Joined on Dec 2010 @ Finland
#97
Also, after stopping monitor mode in faircrack gui and then closing it, i still couldn't use wifieye to scan for networks.

manually using the unload.sh script from the injection drivers solved it.

is there a more elegant way to return to standard functionality?
 

The Following User Says Thank You to mooglez For This Useful Post:
FRuMMaGe's Avatar
Posts: 330 | Thanked: 483 times | Joined on Dec 2010 @ Norwich, UK
#98
Originally Posted by mooglez View Post
The AP tab scan seems to have a problem with blank ssid's.

It shows the details for the previously selected AP when you select the blank entry.
Ahh. I didn't even consider blank essids. This will be problematic.

Basically when you select an essid from the list, it searches for the line in the csv file with that essid in, and grabs the information from there.

I will have to rewrite the code to use the bssid instead.

Thank you for your contribution

Originally Posted by mooglez View Post
Also, after stopping monitor mode in faircrack gui and then closing it, i still couldn't use wifieye to scan for networks.

manually using the unload.sh script from the injection drivers solved it.

is there a more elegant way to return to standard functionality?
I know this sounds dumb, but try clicking the Disable Injection button twice. I'm working on this problem for the next release.
__________________
OMNOM: Pacman-like game now in extras-devel

fAircrack (Aircrack GUI): Point-and-click pwnage for your N900
Now with John the Ripper integration
 
Posts: 100 | Thanked: 18 times | Joined on Jan 2010 @ Bristol, UK
#99
Originally Posted by FRuMMaGe View Post
So you have enabled monitor mode, then started packet capture on a wpa network.

Did you wait for a client to connect?

If not, try it on your own network and connect a laptop or something to generate the handshake, just to test.

(not that you were using it on someone elses network)
lol ya m not trying it out on anyone elses. i did try what you said. i was originally doing that but i still cant get any handshake. i then changed my router security to wep and tried ur script gui but still it didnt work. im debugging atm to see there i might be going wrong.
 
kingoddball's Avatar
Posts: 1,187 | Thanked: 816 times | Joined on Apr 2010 @ Australia
#100
I'm back! Barely slept!

I'm going to try change my mac address if I can find it on the screen and try again!

I will look into John the ripper and wpa. I read post one, but it just seems like wpa was near impossible to break with a dictionary.

Edit: Ok! I have changed my mac address to one found in the airodump windows (this is the start packet capture window, yes?)..
It does not seem to be giving me DeAuth Packets at this point!
I'll report back!

Edit v2:
I don't seem to be getting any ARP's. I did yesterday...
__________________
The thanks button? Sure! You can press it! I would!

Last edited by kingoddball; 2011-01-27 at 20:12.
 
Reply

Tags
aircrack, aircrack-ng, epicfacepalm, pen testing, rtfm dude!


 
Forum Jump


All times are GMT. The time now is 18:00.