|
2011-06-21
, 19:43
|
|
Posts: 5,028 |
Thanked: 8,613 times |
Joined on Mar 2011
|
#882
|
The Following User Says Thank You to Estel For This Useful Post: | ||
|
2011-06-21
, 20:03
|
|
Posts: 298 |
Thanked: 341 times |
Joined on Aug 2010
@ This world :)
|
#883
|
I installed fAircrack (v 0.41) without any problems - everything seems to work fine (no single error message, run through shortcut), ho ever when i test it on my network (temporaly set to WEP 128), i can't get enough ARP request = can't collect high number of IV.
I'm properly authorized with AP (tried both without MAc filter and with MAC filter on and MAC changed to authorized one" - response is "Association successful :-) (AID: 1)".
Still, when i start packet injection, can't get any ARP. I'm sure injection is working as it should, cause if in the same time i try to authenticate into network from desktop PC (using correct MAC but wrong WEP password) N900 injections catch some (3 per one authentication request from desktop) ARP and start to resent it with value close to 500 pps - ACK number indeed start to skyrocket, but ARP request stay the same.
Tried disabling and enabling authentication many times, ho ever only one ARP request that i get is one generated by other client authenticating. I even tried to set exact same MAC as my desktop PC (the other client), but nothing help to make router accept injected packets.
I suppose that problems lies in authentication - because other authenticating client generate ARP, but also, because when trying to inject that 3 sniffed ARP's, from time to time i get (in injection window) info:
"Notice: got a deauth/disassoc packet. Is the source MAC associated ?"
Ho ever, as i said authentication window is all happy and AID: 1.
---
Other side note is that there is no f***** way to get hidden SSID network in scan result (monitor mode of course) unless i directly synchronize scanning with other client attempt to authenticate. I suppose that this could be solved by deauthentication to reveal hidden networks, but i understand that there are troubles with forcing it to work.
//Suggestion
Wifite optimised to work with N900 seems to deauthenticate pretty well, and this is also script, not direct command from terminal - maybe it's method to make deauth working could be implemented into fAircrack?
The Following User Says Thank You to StefanL For This Useful Post: | ||
|
2011-06-21
, 20:04
|
Posts: 146 |
Thanked: 39 times |
Joined on May 2010
|
#884
|
|
2011-06-21
, 20:26
|
|
Posts: 400 |
Thanked: 76 times |
Joined on Nov 2009
@ uk
|
#885
|
Anyone know what the hell has happend here...
BusyBox v1.10.2 (Debian 3:1.10.2.legal-1osso30+0m5) built-in shell (ash)
Enter 'help' for a list of built-in commands.
/home/user # cd /home/user/MyDocs/wl1251-maemo/binary/compat-wireless/
/home/user/MyDocs/wl1251-maemo/binary/compat-wireless # sh load.sh
ifconfig: wlan0: error fetching interface information: Device not found
insmod: error inserting 'compat.ko': -1 Invalid module format
insmod: error inserting 'rfkill_backport.ko': -1 Invalid module format
insmod: error inserting 'cfg80211.ko': -1 Invalid module format
insmod: error inserting 'mac80211.ko': -1 Invalid module format
insmod: error inserting 'wl1251.ko': -1 Invalid module format
insmod: error inserting 'wl1251_spi.ko': -1 Invalid module format
ifconfig: SIOCGIFFLAGS: No such device
/home/user/MyDocs/wl1251-maemo/binary/compat-wireless #
|
2011-06-21
, 21:48
|
|
Posts: 400 |
Thanked: 76 times |
Joined on Nov 2009
@ uk
|
#886
|
|
2011-06-21
, 22:06
|
|
Posts: 435 |
Thanked: 160 times |
Joined on Dec 2009
|
#887
|
|
2011-06-21
, 23:07
|
Posts: 275 |
Thanked: 46 times |
Joined on Feb 2010
|
#888
|
|
2011-06-22
, 00:22
|
|
Posts: 5,028 |
Thanked: 8,613 times |
Joined on Mar 2011
|
#889
|
Newbie question: does faircrack grants complete anonymity or should one take further precautions?
The Following 3 Users Say Thank You to Estel For This Useful Post: | ||
|
2011-06-22
, 02:24
|
Posts: 268 |
Thanked: 75 times |
Joined on Jan 2011
|
#890
|
I have the same problem.
I had faircrack 0.3 (it was working fine), i did the backup of the files and i replaced them with filebox.
PS: i tried it with a network with a space in their name.
Tags |
aircrack, aircrack-ng, epicfacepalm, pen testing, rtfm dude! |
|
sudo gainroot