The Following User Says Thank You to Mr Wolf For This Useful Post: | ||
|
2012-01-15
, 17:06
|
|
Posts: 298 |
Thanked: 341 times |
Joined on Aug 2010
@ This world :)
|
#1142
|
EDIT2 WPA decrypt is not working when i try an use dictionary it just opens and closes , also libDb stuff doesnt seem to be working still !!"
sudo airolib-ng pwddb --stats
The Following User Says Thank You to StefanL For This Useful Post: | ||
|
2012-01-15
, 17:16
|
|
Posts: 298 |
Thanked: 341 times |
Joined on Aug 2010
@ This world :)
|
#1143
|
I don't know, my knowledge is not so great to say something with absolute reliability!
But... if we look at Fake Authentication page:
http://www.aircrack-ng.org/doku.php?...authentication
the ESSID is always specified.
And then it says:
Airodump-ng does not show the ESSID
Airodump-ng does not show the ESSID! How do I do fake authentication since this is a required parameter?
Answer: You need to patient. When a client associates with the AP, then airodump-ng will obtain and display the ESSID. If you are impatient then deauthenticate a client to get the ESSID immediately.
Of course, the ESSID doesn't identify the network univocally as the BSSID; however, as they answered me in Aircrack forum, it seems to be required all the thing to work.
If I well remember (4 years are past!), I found the precise document which says why ESSID is necessary. I'll try and look for it.
Then, I'll also try fAircrack 0.46.
Many thanks for your work!
|
2012-01-15
, 17:20
|
Posts: 529 |
Thanked: 194 times |
Joined on Aug 2010
@ UK
|
#1144
|
WPA decrypt not working could be due to not having any valid data in the cap file, ie. you did not capture any handshakes (xterm window opens and closes quickly).
Most of the libDb stuff will also work too fast to give you a chance to see what is happening on the xterm window, try importing some longish dictionary file (60k lines), or running batch option. Also check if the file pwddb is created under the dictionary list. Try running the following from the diction subdirectory under the FAS directory.Code:sudo airolib-ng pwddb --stats
The Following User Says Thank You to stevomanu For This Useful Post: | ||
|
2012-01-15
, 18:33
|
|
Posts: 5,028 |
Thanked: 8,613 times |
Joined on Mar 2011
|
#1145
|
Aircrack-ng is not perfect, and still has a lot of limitations. Some of them include the type of packets captured when doing the PTW attack (default for fAircrack), length of WEP key (only handles 64bit and 128bit), etc.
The Following User Says Thank You to Estel For This Useful Post: | ||
|
2012-01-15
, 19:13
|
Posts: 2,076 |
Thanked: 3,268 times |
Joined on Feb 2011
|
#1146
|
|
2012-01-19
, 22:18
|
|
Posts: 298 |
Thanked: 341 times |
Joined on Aug 2010
@ This world :)
|
#1147
|
the cap files i have got do have valid handshakes , it doesnty even try an crack them opens an closes with out even reading whats in the cap files ....
double checked cap files on my pc and there good ....
will give the dictionary thing a go now , not sure how many lines mine has to be honest ....
also are you planning on pushing this into the repos its the top must have app thats not there ....
thanks for your reply ..
ls -al > output.txt
The Following User Says Thank You to StefanL For This Useful Post: | ||
|
2012-01-19
, 22:36
|
Posts: 529 |
Thanked: 194 times |
Joined on Aug 2010
@ UK
|
#1148
|
drwxrwxrwx 5 user root 65536 Jan 19 22:43 . drwxrwxrwx 15 user root 65536 Jan 19 20:56 .. -rw-r--r-- 1 user root 5899 Jan 14 13:57 Changelog.txt -rw-r--r-- 1 user root 29123 Nov 30 21:31 FAS.py -rw-r--r-- 1 user root 16477 Jan 17 12:50 FAS.pyo -rw-r--r-- 1 user root 36892 Jan 14 13:55 Main.py drwxrwxrwx 4 user root 65536 Jan 26 2011 cap -rw-r--r-- 1 user root 58 Jan 17 12:51 currentAP.txt drwxrwxrwx 2 user root 65536 Jan 26 2011 diction -rw-r--r-- 1 user root 0 Jan 17 14:05 dictionlist.txt -rw-r--r-- 1 user root 138 Dec 12 07:33 getinfo.sh -rw-r--r-- 1 user root 155 Jan 27 2011 getinterfacestate.sh -rw-r--r-- 1 user root 120 Jun 8 2011 getmacmanaged.sh -rw-r--r-- 1 user root 191 May 26 2011 getmacmonitor.sh -rw-r--r-- 1 user root 3 Jan 19 13:36 interface.txt -rw-r--r-- 1 user root 38181 Jan 31 2011 john.conf -rw-r--r-- 1 user root 261 Dec 7 09:14 john.sh -rw-r--r-- 1 user root 141 Feb 1 2011 johnconf.sh -rw-r--r-- 1 user root 78 Jul 15 2011 keylist.sh -rw-r--r-- 1 user root 0 Jan 17 14:05 keylist.txt drwxrwxrwx 2 user root 65536 Jan 26 2011 keys -rw-r--r-- 1 user root 40 Jan 23 2011 launch.sh -rw-r--r-- 1 user root 163 Jan 27 2011 load.sh -rw-r--r-- 1 user root 18 Jan 19 13:36 mymac.txt -rw-r--r-- 1 user root 0 Jan 19 22:43 output.txt -rw-r--r-- 1 user root 113 May 29 2011 readAP.sh -rw-r--r-- 1 user root 159 May 30 2011 scan.sh -rw-r--r-- 1 user root 0 Jan 19 11:04 scanresults.txt -rw-r--r-- 1 user root 685 Jan 19 11:04 temp-01.cap -rw-r--r-- 1 user root 668 Jan 19 11:04 temp-01.csv -rw-r--r-- 1 user root 1093 Jan 19 11:04 temp-01.kismet.csv -rw-r--r-- 1 user root 4291 Jan 19 11:04 temp-01.kismet.netxml -rw-r--r-- 1 user root 146 Jan 27 2011 unload.sh -rw-r--r-- 1 user root 84 Jul 15 2011 wepcaplist.sh -rw-r--r-- 1 user root 0 Jan 17 14:05 wepcaplist.txt -rw-r--r-- 1 user root 84 Jul 15 2011 wpacaplist.sh -rw-r--r-- 1 user root 0 Jan 17 14:05 wpacaplist.txt
Any updates on this? If you still have problems, send me the output from the listing of the FAS directory.Code:ls -al > output.txt
The Following User Says Thank You to stevomanu For This Useful Post: | ||
|
2012-01-20
, 12:58
|
|
Posts: 298 |
Thanked: 341 times |
Joined on Aug 2010
@ This world :)
|
#1149
|
sorry been every so busy , yes still have some issues it wont even try an crack WEP/WPA at all also having issues picking up access points , were cleven did so not sure whats wrong ......
heres the out put .....
Code:drwxrwxrwx 5 user root 65536 Jan 19 22:43 . drwxrwxrwx 15 user root 65536 Jan 19 20:56 .. -rw-r--r-- 1 user root 5899 Jan 14 13:57 Changelog.txt -rw-r--r-- 1 user root 29123 Nov 30 21:31 FAS.py -rw-r--r-- 1 user root 16477 Jan 17 12:50 FAS.pyo -rw-r--r-- 1 user root 36892 Jan 14 13:55 Main.py drwxrwxrwx 4 user root 65536 Jan 26 2011 cap -rw-r--r-- 1 user root 58 Jan 17 12:51 currentAP.txt drwxrwxrwx 2 user root 65536 Jan 26 2011 diction -rw-r--r-- 1 user root 0 Jan 17 14:05 dictionlist.txt -rw-r--r-- 1 user root 138 Dec 12 07:33 getinfo.sh -rw-r--r-- 1 user root 155 Jan 27 2011 getinterfacestate.sh -rw-r--r-- 1 user root 120 Jun 8 2011 getmacmanaged.sh -rw-r--r-- 1 user root 191 May 26 2011 getmacmonitor.sh -rw-r--r-- 1 user root 3 Jan 19 13:36 interface.txt -rw-r--r-- 1 user root 38181 Jan 31 2011 john.conf -rw-r--r-- 1 user root 261 Dec 7 09:14 john.sh -rw-r--r-- 1 user root 141 Feb 1 2011 johnconf.sh -rw-r--r-- 1 user root 78 Jul 15 2011 keylist.sh -rw-r--r-- 1 user root 0 Jan 17 14:05 keylist.txt drwxrwxrwx 2 user root 65536 Jan 26 2011 keys -rw-r--r-- 1 user root 40 Jan 23 2011 launch.sh -rw-r--r-- 1 user root 163 Jan 27 2011 load.sh -rw-r--r-- 1 user root 18 Jan 19 13:36 mymac.txt -rw-r--r-- 1 user root 0 Jan 19 22:43 output.txt -rw-r--r-- 1 user root 113 May 29 2011 readAP.sh -rw-r--r-- 1 user root 159 May 30 2011 scan.sh -rw-r--r-- 1 user root 0 Jan 19 11:04 scanresults.txt -rw-r--r-- 1 user root 685 Jan 19 11:04 temp-01.cap -rw-r--r-- 1 user root 668 Jan 19 11:04 temp-01.csv -rw-r--r-- 1 user root 1093 Jan 19 11:04 temp-01.kismet.csv -rw-r--r-- 1 user root 4291 Jan 19 11:04 temp-01.kismet.netxml -rw-r--r-- 1 user root 146 Jan 27 2011 unload.sh -rw-r--r-- 1 user root 84 Jul 15 2011 wepcaplist.sh -rw-r--r-- 1 user root 0 Jan 17 14:05 wepcaplist.txt -rw-r--r-- 1 user root 84 Jul 15 2011 wpacaplist.sh -rw-r--r-- 1 user root 0 Jan 17 14:05 wpacaplist.txt
os.system('rm scriptfile.sh')
|
2012-01-23
, 11:13
|
|
Posts: 298 |
Thanked: 341 times |
Joined on Aug 2010
@ This world :)
|
#1150
|
tar -xzvf faircrack0.47.tar.gz
Tags |
aircrack, aircrack-ng, epicfacepalm, pen testing, rtfm dude! |
|
But... if we look at Fake Authentication page:
http://www.aircrack-ng.org/doku.php?...authentication
the ESSID is always specified.
And then it says:
Airodump-ng does not show the ESSID
Airodump-ng does not show the ESSID! How do I do fake authentication since this is a required parameter?
Answer: You need to patient. When a client associates with the AP, then airodump-ng will obtain and display the ESSID. If you are impatient then deauthenticate a client to get the ESSID immediately.
Of course, the ESSID doesn't identify the network univocally as the BSSID; however, as they answered me in Aircrack forum, it seems to be required all the thing to work.
If I well remember (4 years are past!), I found the precise document which says why ESSID is necessary. I'll try and look for it.
Then, I'll also try fAircrack 0.46.
Many thanks for your work!
I'm Winston Wolf, I solve problems