|
2012-01-15
, 01:14
|
Posts: 2,076 |
Thanked: 3,268 times |
Joined on Feb 2011
|
#1132
|
|
2012-01-15
, 03:20
|
Posts: 105 |
Thanked: 87 times |
Joined on Jun 2011
@ Unknown
|
#1133
|
No, I was injecting @ 500 packets/s. IVs capture ration was ~86/s, varying.
Anyway, as I've said in edit to latest post, even with 500k IVs aircrack-ng was unable to crack network WEP.
It would be great, if someone could confirm/deny this, by cracking WEP network without any client connected (this is a *must* requirement, as we do not want some 'legit' packets getting injected by accident resulting in ''legit' response, generating more 'legit' packets etc.) and via interactive injection.
/Estel
The Following User Says Thank You to g0r For This Useful Post: | ||
|
2012-01-15
, 03:55
|
|
Posts: 5,028 |
Thanked: 8,613 times |
Joined on Mar 2011
|
#1134
|
For me with wifite running at 300-400pps is better. With signal around 80 I get ~200 ivs/sec usually. With signal 60-70 even up to 280-300 ivs/sec. Also 40 seconds is quite long. Normally starts flooding at 10-15 seconds from start
The Following User Says Thank You to Estel For This Useful Post: | ||
|
2012-01-15
, 06:11
|
|
Posts: 298 |
Thanked: 341 times |
Joined on Aug 2010
@ This world :)
|
#1135
|
So, now feature requets:
1. Would it be possible to add management of replay-*.cap files, that are created while injecting (both normal, interactive, or just capturing arp)? After some time of usage, they're trashing a lotta hell of space (be it bytes or just names) in place where they're saved, require manual deletion.
2. If we're talking about replay-*.cap management, would it be possible to allow using already saved ones against network? Would require listing them, and, after selecting one, a button to inject with it (could, for example, inject the network that is currently captured via airodump-ng).
3. minor thing - it seems that default time for "scan" set to 5 seconds is a little to low - most of the times it's not enough to even properly scan whole 1-13 channel range. I think that 10 seconds is good thing for default (personally, I almost always use 15 sec, but it's for, ekhm, 'debugging' purposes).
4. You probably knew that I would aks about it - what about reaver/walsh support?
The Following User Says Thank You to StefanL For This Useful Post: | ||
|
2012-01-15
, 06:39
|
|
Posts: 298 |
Thanked: 341 times |
Joined on Aug 2010
@ This world :)
|
#1136
|
No, I was injecting @ 500 packets/s. IVs capture ration was ~86/s, varying.
Anyway, as I've said in edit to latest post, even with 500k IVs aircrack-ng was unable to crack network WEP.
It would be great, if someone could confirm/deny this, by cracking WEP network without any client connected (this is a *must* requirement, as we do not want some 'legit' packets getting injected by accident resulting in ''legit' response, generating more 'legit' packets etc.) and via interactive injection.
/Estel
The Following User Says Thank You to StefanL For This Useful Post: | ||
|
2012-01-15
, 13:54
|
Posts: 2,076 |
Thanked: 3,268 times |
Joined on Feb 2011
|
#1137
|
No, I was injecting @ 500 packets/s. IVs capture ration was ~86/s, varying.
Anyway, as I've said in edit to latest post, even with 500k IVs aircrack-ng was unable to crack network WEP.
It would be great, if someone could confirm/deny this, by cracking WEP network without any client connected (this is a *must* requirement, as we do not want some 'legit' packets getting injected by accident resulting in ''legit' response, generating more 'legit' packets etc.) and via interactive injection.
/Estel
|
2012-01-15
, 15:53
|
Posts: 529 |
Thanked: 194 times |
Joined on Aug 2010
@ UK
|
#1138
|
|
2012-01-15
, 16:00
|
|
Posts: 298 |
Thanked: 341 times |
Joined on Aug 2010
@ This world :)
|
#1139
|
thanks for the update but im having some issues , every option under the decrypt tab does work , matter what i select it just opens an the closes straight away !!
i was on 0.45 before and they all worked fine any ideas whats wrong and how to solve this !!!
|
2012-01-15
, 16:04
|
Posts: 529 |
Thanked: 194 times |
Joined on Aug 2010
@ UK
|
#1140
|
Which options are you referring to (WEP/WPA/..)? Please give me a bit more info to troubleshoot.
Tags |
aircrack, aircrack-ng, epicfacepalm, pen testing, rtfm dude! |
|
Anyway, as I've said in edit to latest post, even with 500k IVs aircrack-ng was unable to crack network WEP.
It would be great, if someone could confirm/deny this, by cracking WEP network without any client connected (this is a *must* requirement, as we do not want some 'legit' packets getting injected by accident resulting in ''legit' response, generating more 'legit' packets etc.) and via interactive injection.
/Estel
N900's aluminum backcover / body replacement
-
N900's HDMI-Out
-
Camera cover MOD
-
Measure battery's real capacity on-device
-
TrueCrypt 7.1 | ereswap | bnf
-
Hardware's mods research is costly. To support my work, please consider donating. Thank You!
Last edited by Estel; 2012-01-15 at 01:01.