|
2011-04-24
, 11:10
|
Posts: 19 |
Thanked: 1 time |
Joined on Apr 2011
|
#692
|
|
2011-04-24
, 12:20
|
|
Posts: 298 |
Thanked: 341 times |
Joined on Aug 2010
@ This world :)
|
#693
|
The Following User Says Thank You to StefanL For This Useful Post: | ||
|
2011-04-24
, 13:44
|
Posts: 289 |
Thanked: 49 times |
Joined on Jun 2010
|
#695
|
|
2011-04-24
, 16:49
|
Posts: 428 |
Thanked: 226 times |
Joined on Dec 2010
@ Philippines
|
#696
|
First, a big ty for FRuMMaGe for making this app ^^
If anyone has the link for WEPCrackGUI, please do share.
The Following User Says Thank You to topet2k12001 For This Useful Post: | ||
|
2011-04-24
, 17:22
|
Posts: 42 |
Thanked: 49 times |
Joined on Apr 2011
|
#697
|
The Following User Says Thank You to codecxbox For This Useful Post: | ||
|
2011-04-24
, 17:38
|
Posts: 289 |
Thanked: 49 times |
Joined on Jun 2010
|
#698
|
|
2011-04-25
, 13:35
|
Posts: 19 |
Thanked: 1 time |
Joined on Apr 2011
|
#699
|
You really do not need these 2 steps, if the AP you are attacking has a lot of wifi traffic, like if other clients are connected to the AP at the same time and those clients are active, like downloading or torrenting. But if these clients are idle or the AP doesnt have any clients attached, it would take a long time to capture enough packets for Aircrack to decrypt.
Its like if you attack a AP in a shopping mall, you wouldnt have to inject and authenticize. But if you were in a desert attacking a AP without any clients, you would have to inject. Think about like your N900 doing 2 jobs at the same time, a normal client and the attacker.
|
2011-04-25
, 23:26
|
Posts: 42 |
Thanked: 49 times |
Joined on Apr 2011
|
#700
|
Tags |
aircrack, aircrack-ng, epicfacepalm, pen testing, rtfm dude! |
|
1- First I have to load the modified wl12 drivers in xterminal.
sh load.sh
2- Then I have to load faircrack in xterminal.
sh launch.sh
Which is very good because you get to see all 3 processes at the same time. Most times, packet injection will stop, so just monitor the packet injection window. If it closes by itself, just touch Packet Injection again without having to launch faircrack again.
3- you really need another wifi device to start a deauth session. The N900 by itself will most likely never deauth a AP.
4-After the faircrack session, to reestablish normal wifi , just unload the modified wl drivers
sh unload.sh
Hope it helps...