Aircrack-ng

Please login or register.

Login with username, password and session length
Pages: [1] 2 3 ... 10
 1 
 on: May 25, 2019, 09:21:44 am 
Started by Karunjhn - Last post by feewie
I am using an Dell Latitude 3480 laptop which comes with the Qualcomm Atheros QCA6174 Wifi card with Ubuntu OS (16.04 Release). When I use it as a sniffer (using wireshark) after enabling monitor mode using airmon-ng, I am only able to get Beacon and Probe response frames (which are the management packets). I am not able to get the data packets in wireshark. I tried sniffing packets from an tcp traffic run between an Netgear AP and a client in 5G network with open-none security. Is this an expected problem with this card? I tried reinstalling the driver and all, but no change. The kernel I use is 4.4.102-0404102-generic. Can someone really help me out?

There's another thread in this forum with information on this card:
https://forum.aircrack-ng.org/index.php?topic=1521.0

I got monitor mode working fine and capturing packets with rawmode=1 cryptmode=1 as parameters for ath10k_core.

I  never managed to get the injection test working.

Could you detail how you got monitor mode working?

So far I have tried using different firmware from https://github.com/kvalo/ath10k-firmware/tree/master/QCA6174/hw3.0/4.4.1 without any success.

I did check out the other post you mentioned but couldn't follow.
Thanks.   ;D ;D

 2 
 on: May 19, 2019, 06:27:47 am 
Started by der_Schokomuffin - Last post by peterfarge
Hello Forum,

with long wordlists I have to save and resume a aircrack session. I know the john the ripper examples and how they work. Now I have seen that since july 2018 there is a native way to save+resume with aircrack-ng. How does it work?

Code: [Select]
// A normal session, all works like expected:
aircrack-ng -b 11:22:33:44:55:66 -w passwords.txt handshake.pcap
Code: [Select]
// I think it should work like this: Save the session to file savefile.session
aircrack-ng -b 11:22:33:44:55:66 -w passwords.txt -N savefile.session handshake.pcap

But all I got is:
Quote
"aircrack-ng --help" for help.

Quitting aircrack-ng...

Code: [Select]
// After aborting, resume the session:
aircrack-ng -R savefile.session

I'm using Kali and I have done a apt-get update + upgrade.
Aircrack says its the 'Aircrack-ng 1.3' version.


Thanks

Peter

 3 
 on: May 09, 2019, 07:50:25 pm 
Started by der_Schokomuffin - Last post by d479
When doing a make, the Makefile tries to remove the subdirectory aircrack-ng but complains it's a directory. If I rename the directory to something completely different - tt - then I can make again and it will complete the install.

I tired to create a pull request after logging in but I couldn't.

Enclosed is the error - it's trying to remove

  ./src/aircrack-ng/aircrack-ng


  CCLD     libaircrack.la
ar: `u' modifier ignored since `D' is the default (see `U')
  CC       src/aircrack-ng/aircrack_ng-aircrack-ng.o
  CXX      src/aircrack-ng/aircrack_ng-linecount.o
  CC       src/aircrack-ng/aircrack_ng-session.o
rm: cannot remove 'aircrack-ng': Is a directory
Makefile:3051: recipe for target 'aircrack-ng' failed
make[1]: *** [aircrack-ng] Error 1
make[1]: Leaving directory '/opt/aircrack-ng/src/aircrack-ng'
Makefile:4711: recipe for target 'install-recursive' failed
make: *** [install-recursive] Error 1

 4 
 on: May 05, 2019, 07:04:08 pm 
Started by der_Schokomuffin - Last post by modulusmath
airodump-ng reports if it capture the WPA handshake, but it does not state which client handshake it captured. This would be useful for WPA2 networks

 
 

 5 
 on: May 05, 2019, 07:00:32 pm 
Started by der_Schokomuffin - Last post by modulusmath

I've been running airodump-ng but I can't see a way to specify when to rollover to another file (i.e 200MB etc). I've run it for an hour on a small network but it's still writing to the same file.

 6 
 on: May 05, 2019, 05:43:54 pm 
Started by der_Schokomuffin - Last post by Chris054
Hello ;)

I use the aicrack command with crunch for bruteforce.
To test the speed I compared 2 machines:
- A PC Professional HP EliteBook 850 G3 with i5-6300U @ 2.40 GHz under Win10
- A 7.2 RH Server on command line with 2 Xeon E5-2697 v4 @ 2.30GHz
So we have on the one hand a processor at about $250 and on the other hand 2 processors at about $2700 per unit.

My question :
Why the first reaches 5000 k/s and the second 1800 k/s ???

Thx,
Chris

 7 
 on: April 30, 2019, 09:02:40 am 
Started by der_Schokomuffin - Last post by der_Schokomuffin
Hey,
first i am very new in this topic. I have an USB-Wireless-Lan adapter, a TP-Link TL-WN722N. Now I am trying to switch it into monitor mode, but this is not working. When I am trying to switch the pre-installed into monitor mode, does it work, but I am not sure if this adapter is able to work with airodump-ng or the other programs. I really have no idea how i can solve this problem, i need help!

Best wishes,
der_Schokomuffin

PS: I am sorry for any spelling or grammatical mistakes!

 8 
 on: April 24, 2019, 03:49:10 pm 
Started by air1625 - Last post by misterx
1.That's a very old thread, in this case, open a new one.
2. Where is the problem? It successfully cracked it and gave you the passphrase.

 9 
 on: April 24, 2019, 03:44:15 pm 
Started by george369 - Last post by misterx
Would you be able to provide the pcap and password so we can add a test for this case?

 10 
 on: April 24, 2019, 10:33:45 am 
Started by air1625 - Last post by echosector0
hi first think you have to know is aircrack-ng is decryptor for ".cap" that you got it from handshake for the ap, if you can not get that handshake so you can not get the password

this is the sample that i got

D:\aircrack-ng\bin\64bit>aircrack-ng d:\handshake_10AF_74-DA-38-4D-B0-5D_2019-01
-15T10-12-54.cap -w "d:\List Password\rockyou.txt"
Opening d:\handshake_10AF_74-DA-38-4D-B0-5D_2019-01-15T10-12-54.cap
Read 6552 packets.

   #  BSSID              ESSID                     Encryption

   1  74:DA:38:4D:B0:5D  10 AF                     WPA (1 handshake, with PMKID)


Choosing first network as target.

Opening d:\handshake_10AF_74-DA-38-4D-B0-5D_2019-01-15T10-12-54.cap
Read 6552 packets.

1 potential targets



                              Aircrack-ng 1.5.2

      [00:00:21] 66103/9822769 keys tested (1898.10 k/s)

      Time left: 1 hour, 25 minutes, 40 seconds                  0.67%

                           KEY FOUND! [ astalavista11 ]


      Master Key     : C3 F5 8F DE 19 DD 40 C8 DD 61 20 9F 01 82 EE 03
                       18 A0 A5 FF E9 A1 58 79 CF 82 7D BF EA A8 27 15

      Transient Key  : 75 63 87 78 B4 7D 7E 6E C4 5B 50 1B 6C B6 7D C7
                       28 48 66 84 C6 4E 11 C8 FD BC E9 C0 0F 7D 60 C7
                       37 42 48 69 2C 4C 6C 5B 40 C1 E1 CD 56 98 56 CF
                       44 9B CA A0 B6 C1 DE 68 01 87 CB F8 F5 0F 72 5F

      EAPOL HMAC     : ED 57 CC 46 D2 8C 86 A6 F9 07 2B 5B AC 7F 21 E8


and yes i'm running this tools on windows using cmd

to get the handshake use anytools

this is the samples

https://www.kalitutorials.net/2014/06/hack-wpa-2-psk-capturing-handshake.html

Pages: [1] 2 3 ... 10