![]() |
2011-09-17
, 21:34
|
|
Posts: 5,028 |
Thanked: 8,613 times |
Joined on Mar 2011
|
#202
|
Do we really need deauthentication in cleven???
i really don't think we needed it (on my behalf) cause i have Cleven, fAircrack & Wepon on my device....fAircrack does have the deauthentication but it doesn't work all the time...beside deauthentication only works if there a clients connected with the AP....
for me the most important is authentication....Wepon got the best authentication...Cleven is seconds & fAircrack third....i think we should focus on authentication (in Cleven) cause we need to authenticate if there no clients connected to any AP...if there is a clients then all we have to do is waits until the data is around 35k-50k before we try to decrypt it....
have asked this also in the past - why you mention two types of deauthentication?
AFAIK, there is only one. One needs to deauthenticate a client from the AP and for that the mac of a connected client is needed.
The Following User Says Thank You to Estel For This Useful Post: | ||
![]() |
2011-09-18
, 04:44
|
|
Posts: 5,028 |
Thanked: 8,613 times |
Joined on Mar 2011
|
#203
|
![]() |
2011-09-18
, 08:57
|
|
Posts: 1,648 |
Thanked: 2,122 times |
Joined on Mar 2007
@ UNKLE's Never Never Land
|
#204
|
Sorry for double-posting, but I *might* have found a bug.
When I try decrypting with "all common" enabled, aircrack-ng window just "flashes", like when trying to decrypt from .cap file without any IVs. I'm sure all of my files contain IV's, and I can try to decrypt them individually - everything work fine. Ho ever, trying to decrypt all common - no matter which (number) file i select, result in a no-go. So, ping Saturn
![]() |
2011-09-18
, 09:03
|
|
Posts: 1,648 |
Thanked: 2,122 times |
Joined on Mar 2007
@ UNKLE's Never Never Land
|
#205
|
...
for me the most important is authentication....Wepon got the best authentication...Cleven is seconds & fAircrack third....
![]() |
2011-09-18
, 10:15
|
Posts: 2,076 |
Thanked: 3,268 times |
Joined on Feb 2011
|
#206
|
![]() |
2011-09-18
, 10:57
|
|
Posts: 1,648 |
Thanked: 2,122 times |
Joined on Mar 2007
@ UNKLE's Never Never Land
|
#207
|
There can be several reasons and one or more can affect you:
* You are physically too far away from the client(s). You need enough transmit power for the packets to reach and be heard by the clients. If you do a full packet capture, each packet sent to the client should result in an “ack” packet back. This means the client heard the packet. If there is no “ack” then likely it did not receive the packet.
* Wireless cards work in particular modes such b, g, n and so on. If your card is in a different mode then the client card there is good chance that the client will not be able to correctly receive your transmission. See the previous item for confirming the client received the packet.
* Some clients ignore broadcast deauthentications. If this is the case, you will need to send a deauthentication directed at the particular client.
* Clients may reconnect too fast for you to see that they had been disconnected. If you do a full packet capture, you will be able to look for the reassociation packets in the capture to confirm deauthentication worked.
The Following User Says Thank You to Saturn For This Useful Post: | ||
![]() |
2011-09-18
, 11:04
|
|
Posts: 1,648 |
Thanked: 2,122 times |
Joined on Mar 2007
@ UNKLE's Never Never Land
|
#208
|
Not necessarily. -p0481 attack option in wifite does work on some (most?) APs and can get 150-200 ivs/sec with no clients around. It does seem to return bogus data on some APs (newer soft version maybe, no idea really) and then you might need 150k instead, but in the end works very well with no clients connected.
The Following User Says Thank You to Saturn For This Useful Post: | ||
![]() |
2011-09-18
, 11:24
|
Posts: 2,076 |
Thanked: 3,268 times |
Joined on Feb 2011
|
#209
|
![]() |
2011-09-18
, 11:39
|
|
Posts: 1,648 |
Thanked: 2,122 times |
Joined on Mar 2007
@ UNKLE's Never Never Land
|
#210
|
Just download wifite.py (http://code.google.com/p/wifite/) and run it. It has 4 attack options, 4th one being the clientless. I also could not find too much about it, and sadly have no python skills to look through the code.
EDIT: it's -p 0841, my mistake
i really don't think we needed it (on my behalf
for me the most important is authentication....Wepon got the best authentication...Cleven is seconds & fAircrack third....i think we should focus on authentication (in Cleven) cause we need to authenticate if there no clients connected to any AP...if there is a clients then all we have to do is waits until the data is around 35k-50k before we try to decrypt it....
My Phone Evolution : Nokia 3650-Nokia 6600-Nokia 6630-Motorola Rizr-Sony P1i-Nokia E63-Nokia X3-Samsung E980-Iphone 2G-Sony W595-Nokia E71-Nokia 5800-Nokia N900-HTC Hero-Xperia Mini Pro