Active Topics

 



Notices


Reply
Thread Tools
Estel's Avatar
Posts: 5,028 | Thanked: 8,613 times | Joined on Mar 2011
#211
Originally Posted by Saturn View Post
Cannot confirm it.

One thing that might not be clear is that the "common" cannot check ".cap" and ".ivs" files together (that's a limitation of aircrack).

Therefore, if you have 20 .cap files and 1 .ivs file from an AP and you select the ivs file + common, you basically select the ivs only.

Could this be the "bug" you see?
Negative. I've just checked it, and all files are .ivs. Also, I managed to capture error aircrack-ng is throwing at me, when I try all common:

Code:
Opening /home/user/.cleven/capturedData/WEP/name_of_ap*.cap
open failed: No such file or directory
If I try any of .ivs without "all common" everything works (but only for selected .ivs file, obviously)

Also, huge thanks for adding broadcast deauth!

Originally Posted by szopin
Just download wifite.py (http://code.google.com/p/wifite/) and run it. It has 4 attack options, 4th one being the clientless. I also could not find too much about it, and sadly have no python skills to look through the code.
EDIT: it's -p 0841, my mistake
Thanks szopin, I didn't know that method. I hope it will make it's way to Cleven.

/Estel
__________________
N900's aluminum backcover / body replacement
-
N900's HDMI-Out
-
Camera cover MOD
-
Measure battery's real capacity on-device
-
TrueCrypt 7.1 | ereswap | bnf
-
Hardware's mods research is costly. To support my work, please consider donating. Thank You!
 

The Following User Says Thank You to Estel For This Useful Post:
Saturn's Avatar
Posts: 1,648 | Thanked: 2,122 times | Joined on Mar 2007 @ UNKLE's Never Never Land
#212
Originally Posted by Estel View Post
Negative. I've just checked it, and all files are .ivs. Also, I managed to capture error aircrack-ng is throwing at me, when I try all common:

Code:
Opening /home/user/.cleven/capturedData/WEP/name_of_ap*.cap
open failed: No such file or directory
If I try any of .ivs without "all common" everything works (but only for selected .ivs file, obviously)
Could it be the name of the AP has some special character? to be more specific a "."?

Not sure yet but I have a suspicion on what could go wrong.

If you don't mind PM me with the exact AP name..
 

The Following User Says Thank You to Saturn For This Useful Post:
TMavica's Avatar
Posts: 2,021 | Thanked: 1,060 times | Joined on Apr 2010 @ Hong Kong
#213
can you make a harmattan icon of it?
 
Posts: 435 | Thanked: 197 times | Joined on Feb 2010
#214
*redacted by mistake...*

Last edited by IsaacDFP; 2011-09-19 at 20:08.
 
Estel's Avatar
Posts: 5,028 | Thanked: 8,613 times | Joined on Mar 2011
#215
You have to use MAC registered with AP.
__________________
N900's aluminum backcover / body replacement
-
N900's HDMI-Out
-
Camera cover MOD
-
Measure battery's real capacity on-device
-
TrueCrypt 7.1 | ereswap | bnf
-
Hardware's mods research is costly. To support my work, please consider donating. Thank You!
 

The Following User Says Thank You to Estel For This Useful Post:
Posts: 435 | Thanked: 197 times | Joined on Feb 2010
#216
Originally Posted by Estel View Post
You have to use MAC registered with AP.
Omg, MAC-Filtering? That's all that it means? Wow, thank you very much!!! I finally have a new solution to try out
 
Posts: 435 | Thanked: 197 times | Joined on Feb 2010
#217
Hmmm... I used one of the MAC registered with the AP, and the authentication was succesful for the first 4 or 5 tries, but then it started rejecting me, I think...

Code:
13:59:18  Sending Authentication Request (Open System) (ACK)
13:59:18  Authentication successful
13:59:18  Sending Association Request (ACK)
13:59:18  Got a deauthentication packet!
And after a few of those, it went back to Association Denied (Code 18)... Any more advise at this point would be greatly appreciated... Could it be some form of manual "counter-attack"...? :|
 
Posts: 2,076 | Thanked: 3,268 times | Joined on Feb 2011
#218
You flooded the AP with reply-inducing forged packets by any chance? This is their defense. And worst part is... the MAC you spoofed might learn about the unsuccessfull attack, good luck with wpa cracking
 

The Following User Says Thank You to szopin For This Useful Post:
Posts: 105 | Thanked: 87 times | Joined on Jun 2011 @ Unknown
#219
Not sure if this is a bug for aps with space in cleven, works fine with fAircrack:

00:01:16 Waiting for beacon frame (BSSID: xx:xx:xx:xx:xx:xx) on channel 10
For the given BSSID "xx:xx:xx:xx:xx:xx", there is an ESSID mismatch!
Found ESSID "Xxx Xxx" vs. specified ESSID "Xxx"
Using the given one, double check it to be sure its correct!

00:01:16 Sending Authentication Request (Open System) [ACK]
00:01:16 Authentication successful
00:01:16 Sending Association Request [ACK]
00:01:16 Denied (code 12), wrong ESSID or WPA ?

00:01:19 Sending Authentication Request (Open System) [ACK]
00:01:19 Authentication successful
00:01:19 Sending Association Request [ACK]
00:01:19 Denied (code 12), wrong ESSID or WPA ?

Edit: same ap same settings no space worked perfect

Last edited by g0r; 2011-09-19 at 23:46.
 

The Following 2 Users Say Thank You to g0r For This Useful Post:
Posts: 46 | Thanked: 16 times | Joined on Jan 2008 @ Edmonton, AB, Canada
#220
[FIXED! See below]

Quick (possible) bug report:

It looks like the version from extras-devel (1.12-1) is not correct. It says "Cleven 1.10" at the top, and (for instance) does not recognize .ivs files in the "Decrypt capture" screen.

I've downloaded the clevenMain.py file from the source and used it instead of the clevenMain.pyc file, and it works well (albeit it feels slower, as expected).

Autobuilder mixup, maybe?

===
I found the issue. It turns out that I had installed 1.10 from Extras first, and when I upgraded to 1.12-1 from Extras-devel, the .pyc files were never deleted. Interesting quirk I was not expecting...

No problems with Cleven, then.

Last edited by pablob; 2011-09-20 at 20:47.
 

The Following User Says Thank You to pablob For This Useful Post:
Reply

Tags
aircrack, cleven, reaver


 
Forum Jump


All times are GMT. The time now is 15:35.