|
2011-06-14
, 20:56
|
|
Posts: 298 |
Thanked: 341 times |
Joined on Aug 2010
@ This world :)
|
#822
|
Because I couldnt find the ascii code. I finally solved it and first wep key cracked
|
2011-06-15
, 02:01
|
Posts: 738 |
Thanked: 179 times |
Joined on Mar 2010
@ Gold Coast, Australia
|
#823
|
Trine provides the command here not sofar back in the thread :
http://talk.maemo.org/showpost.php?p...&postcount=762
Easiest way to find the attached clients bssid is to capture packets, any attached clients are shown there on the packet capture xterm screen.
Since you are already capturing packets, open another xterm (CTRL-Shift-X) to deauth the attached client and you should be able to capture the handshake.
|
2011-06-15
, 02:43
|
Posts: 738 |
Thanked: 179 times |
Joined on Mar 2010
@ Gold Coast, Australia
|
#824
|
|
2011-06-15
, 03:06
|
|
Posts: 723 |
Thanked: 519 times |
Joined on Nov 2010
@ Kuching:Malaysia
|
#825
|
Thanks heaps for your reply, now i just have a question
Here is the code right
aireplay-ng -0 2 -a 00:11:22:33:44:55 -c 99:88:77:66:55:44 wlan0
|
2011-06-15
, 08:06
|
Posts: 13 |
Thanked: 8 times |
Joined on Oct 2010
|
#826
|
Thanks heaps for your reply, now i just have a question
Here is the code right
aireplay-ng -0 2 -a 00:11:22:33:44:55 -c 99:88:77:66:55:44 wlan0
But what is the actual code and what is the bssid?
To me that looks like two mac address one before the -a and one after -c?
Thanks if you could help me with that.
Now another thing, Which page is the instructions on that shows steps to install faircrack 0.4.1..
Thanks in Advance
|
2011-06-15
, 08:30
|
|
Posts: 162 |
Thanked: 20 times |
Joined on Oct 2009
@ California
|
#827
|
|
2011-06-15
, 09:16
|
Posts: 529 |
Thanked: 194 times |
Joined on Aug 2010
@ UK
|
#828
|
|
2011-06-15
, 10:37
|
|
Posts: 298 |
Thanked: 341 times |
Joined on Aug 2010
@ This world :)
|
#829
|
Now another thing, Which page is the instructions on that shows steps to install faircrack 0.4.1..
Thanks in Advance
|
2011-06-15
, 12:11
|
Posts: 738 |
Thanked: 179 times |
Joined on Mar 2010
@ Gold Coast, Australia
|
#830
|
Tags |
aircrack, aircrack-ng, epicfacepalm, pen testing, rtfm dude! |
|
My phone evolution: Nokia 7610 (RIP), N82 (RIP), BB9000 (RIP), N900, BB9760 (RIP), N8, BB9900, N9 64GB
Working : Python Gorillas (Maemo5) Faircrack0.50 Update (Maemo5)
Not so much : WPScrack (Maemo5)