Notices


Reply
Thread Tools
Posts: 146 | Thanked: 39 times | Joined on May 2010
#881
Originally Posted by pedrocoba View Post
Now after I type that command and appeared:

~ $ /home/user/MyDocs/wl1251-maemo/binary/compat-wireless
-sh: /home/user/MyDocs/wl1251-maemo/binary/compat-wireless: Permission denied
~ $
do you run as root?
sudo gainroot
 
Estel's Avatar
Posts: 5,028 | Thanked: 8,613 times | Joined on Mar 2011
#882
I installed fAircrack (v 0.41) without any problems - everything seems to work fine (no single error message, run through shortcut), ho ever when i test it on my network (temporaly set to WEP 128), i can't get enough ARP request = can't collect high number of IV.

I'm properly authorized with AP (tried both without MAc filter and with MAC filter on and MAC changed to authorized one" - response is "Association successful :-) (AID: 1)".

Still, when i start packet injection, can't get any ARP. I'm sure injection is working as it should, cause if in the same time i try to authenticate into network from desktop PC (using correct MAC but wrong WEP password) N900 injections catch some (3 per one authentication request from desktop) ARP and start to resent it with value close to 500 pps - ACK number indeed start to skyrocket, but ARP request stay the same.

Tried disabling and enabling authentication many times, ho ever only one ARP request that i get is one generated by other client authenticating. I even tried to set exact same MAC as my desktop PC (the other client), but nothing help to make router accept injected packets.

I suppose that problems lies in authentication - because other authenticating client generate ARP, but also, because when trying to inject that 3 sniffed ARP's, from time to time i get (in injection window) info:

"Notice: got a deauth/disassoc packet. Is the source MAC associated ?"

Ho ever, as i said authentication window is all happy and AID: 1.

---

Other side note is that there is no f***** way to get hidden SSID network in scan result (monitor mode of course) unless i directly synchronize scanning with other client attempt to authenticate. I suppose that this could be solved by deauthentication to reveal hidden networks, but i understand that there are troubles with forcing it to work.

//Suggestion
Wifite optimised to work with N900 seems to deauthenticate pretty well, and this is also script, not direct command from terminal - maybe it's method to make deauth working could be implemented into fAircrack?
 

The Following User Says Thank You to Estel For This Useful Post:
StefanL's Avatar
Posts: 298 | Thanked: 341 times | Joined on Aug 2010 @ This world :)
#883
Originally Posted by Estel View Post
I installed fAircrack (v 0.41) without any problems - everything seems to work fine (no single error message, run through shortcut), ho ever when i test it on my network (temporaly set to WEP 128), i can't get enough ARP request = can't collect high number of IV.

I'm properly authorized with AP (tried both without MAc filter and with MAC filter on and MAC changed to authorized one" - response is "Association successful :-) (AID: 1)".

Still, when i start packet injection, can't get any ARP. I'm sure injection is working as it should, cause if in the same time i try to authenticate into network from desktop PC (using correct MAC but wrong WEP password) N900 injections catch some (3 per one authentication request from desktop) ARP and start to resent it with value close to 500 pps - ACK number indeed start to skyrocket, but ARP request stay the same.

Tried disabling and enabling authentication many times, ho ever only one ARP request that i get is one generated by other client authenticating. I even tried to set exact same MAC as my desktop PC (the other client), but nothing help to make router accept injected packets.

I suppose that problems lies in authentication - because other authenticating client generate ARP, but also, because when trying to inject that 3 sniffed ARP's, from time to time i get (in injection window) info:

"Notice: got a deauth/disassoc packet. Is the source MAC associated ?"

Ho ever, as i said authentication window is all happy and AID: 1.

---

Other side note is that there is no f***** way to get hidden SSID network in scan result (monitor mode of course) unless i directly synchronize scanning with other client attempt to authenticate. I suppose that this could be solved by deauthentication to reveal hidden networks, but i understand that there are troubles with forcing it to work.

//Suggestion
Wifite optimised to work with N900 seems to deauthenticate pretty well, and this is also script, not direct command from terminal - maybe it's method to make deauth working could be implemented into fAircrack?
Thanks for the positive feed-back and suggestions; it is always appreciated.

Definitely agree with you, there are a lot of things to be learned from the other cracking/hacking applications. There are plenty of threads just by typing aircrack into the search box. My day job and the normal banalities of life keep me from spending the time I want (24/7 ) hacking around on the N900. I will be posting any new updates (with new features) as soon as I have them and am happy that they will be useable.
__________________
My phone evolution: Nokia 7610 (RIP), N82 (RIP), BB9000 (RIP), N900, BB9760 (RIP), N8, BB9900, N9 64GB
Working : Python Gorillas (Maemo5) Faircrack0.50 Update (Maemo5)
Not so much : WPScrack (Maemo5)
 

The Following User Says Thank You to StefanL For This Useful Post:
Posts: 146 | Thanked: 39 times | Joined on May 2010
#884
hi
i got the same problem
"Notice: got a deauth/disassoc packet. Is the source MAC associated ?"
i had send a pm to StefanL to include in the script a force auth. how know maybe will work
 
Kevstacey's Avatar
Posts: 400 | Thanked: 76 times | Joined on Nov 2009 @ uk
#885
Originally Posted by lucas777 View Post
Anyone know what the hell has happend here...

BusyBox v1.10.2 (Debian 3:1.10.2.legal-1osso30+0m5) built-in shell (ash)
Enter 'help' for a list of built-in commands.

/home/user # cd /home/user/MyDocs/wl1251-maemo/binary/compat-wireless/
/home/user/MyDocs/wl1251-maemo/binary/compat-wireless # sh load.sh
ifconfig: wlan0: error fetching interface information: Device not found
insmod: error inserting 'compat.ko': -1 Invalid module format
insmod: error inserting 'rfkill_backport.ko': -1 Invalid module format
insmod: error inserting 'cfg80211.ko': -1 Invalid module format
insmod: error inserting 'mac80211.ko': -1 Invalid module format
insmod: error inserting 'wl1251.ko': -1 Invalid module format
insmod: error inserting 'wl1251_spi.ko': -1 Invalid module format
ifconfig: SIOCGIFFLAGS: No such device
/home/user/MyDocs/wl1251-maemo/binary/compat-wireless #
i'm having same problem as this, any fixes for it?

cheers
 
Kevstacey's Avatar
Posts: 400 | Thanked: 76 times | Joined on Nov 2009 @ uk
#886
anyone?

ive had a good look through the thread but dont see any fixes for this

any help appreciated cheers
 
windows7's Avatar
Posts: 435 | Thanked: 160 times | Joined on Dec 2009
#887
Originally Posted by Kevstacey View Post
i'm having same problem as this, any fixes for it?

cheers
for a long time i had this problem,
until i realized, due to the multiboot with android,
it create what i assumed to be a maemo duplicate entry,
having boot into this latest maemo menu option the injection drivers just worked by default.
So no more need to load or unload the drivers
 
Posts: 275 | Thanked: 46 times | Joined on Feb 2010
#888
Newbie question: does faircrack grants complete anonymity or should one take further precautions?
 
Estel's Avatar
Posts: 5,028 | Thanked: 8,613 times | Joined on Mar 2011
#889
Originally Posted by Patroclo View Post
Newbie question: does faircrack grants complete anonymity or should one take further precautions?
While of course You're hacking only your own network for security purposes, the main precaution You shall do is to use "random" MAC generator (present in fAircrack) before You even start any RX/TX = before You start any attack.

If You're using passive mode, IE You just collect data (i.e. "start packet capture" button), You don't send ANY packets to given network = You're not taking any activity and in general (with few special exceptions) don't leave any traces. As name for "monitor mode" say, You're just only monitoring. Ho ever, when authenticating with AP and injecting, You're attacking actively and first + most common method of identification - if someone care - is to check attacker MAC.

Passive mode can be pretty effective if You're hacking network with many clients + authenticating quite often (= high rotation of connected users). For special cases, it may be better to sniff data for several hours then decrypt, than perform 5 min successful attack and leave traces.

Are there other means of identification than MAC? Of course they are, but as long as You're not hacking some top-secret government networks, you probably don't need to care. For example, for most phones, they can be identified even without SIM cart inserted (and most phones that aren't 10+ years old, even when turned off but with battery on place! IDK how it is with N900, but if someone know, i would love to get info about this), if they were used with SIM at least one time. So, in places with many cell base stations, it's possible to quite accurately check who and when (at the moment of attack) was close enough to AP to perform hacking attempt.

//Side note - out fellow "law enforcement" services have created many means of tracking/identification by use of most popular electronic gadget - mobile phone. Of course officially it's to help in catching serious crimes or to find stolen mobiles - even when SIM card was pulled out and phone powered down. I don't want to start any conspiracy theories here, but i never heard about any stolen phone being received by means of probing "acting dead" phones. Police just don't care enough to send GSM base station operators such a request. Still, many megawattes and processor cycles (on GSM infrastructure) are "wasted" to probe hardware identification data non-related to SIM, and to interpret that data. So, there must be really big rationale for "them" to do so
 

The Following 3 Users Say Thank You to Estel For This Useful Post:
Posts: 268 | Thanked: 75 times | Joined on Jan 2011
#890
Originally Posted by Brian_7 View Post
I have the same problem.

I had faircrack 0.3 (it was working fine), i did the backup of the files and i replaced them with filebox.

PS: i tried it with a network with a space in their name.
I forgot to say that i am using kernel power V46. Do i need kernel power V47?

PS: i have the same problem with other network that doesn't have a space in its name.
 
Reply

Tags
aircrack, aircrack-ng, epicfacepalm, pen testing, rtfm dude!


 
Forum Jump


All times are GMT. The time now is 23:36.