Aircrack-ng forum

Please login or register.

Login with username, password and session length
Advanced search  


Aircrack-ng 1.6 release

Pages: 1 ... 8 9 [10]
 on: February 11, 2021, 03:37:46 am 
Started by wonkiponki - Last post by misterx
Driver names sometime change over time. This card is old-ish. TL;DR: plug it and it should work just fine.

 on: February 10, 2021, 12:39:14 pm 
Started by wonkiponki - Last post by wonkiponki
Hello everybody  :D

I found used edimax ew-7318USg for only 2 euros. I checked this model on wikidevi and there is information 

WI1 chip1: Ralink RT2571W
WI1 chip2: Ralink Model?
Probable Linux driver
rt73usb (in backports)

In comparison to this from aircrack-ng offical documentation: on usb network cards I found such information:
Edimax EW-7318USg   Chipset:Ralink rt73   Antenna: RP-SMA   Windows support:No   Linux support:Yes

So there is mistake on wikidevi that this NC contains RT2571W or this same model producer made once time with RT2571W(from wikidevi) and second time with Ralink rt73(airack-ng documentation) ?

Thank you in advance for answering this question. I would be very glad to have this NC from 2 euro.

 on: February 09, 2021, 01:42:35 pm 
Started by Francois1963 - Last post by Francois1963
I take it back.  In crypto.h & .c, gcrypt-openssl-wrapper.h, can be found the functions to generate the icv, tkip and ciphers.  So altering the security information for testing purposes appears easy to do.  Thanks for the help.

 on: February 09, 2021, 12:08:51 pm 
Started by Francois1963 - Last post by Francois1963
I looked at create_ieee_hdr, create_probe, etc... These functions create packets but I suspect they are delivered to the WiFi device (chip) which will encapsulate with the PHY info using hardware logic for the encryption of the ICV, TKIP-MIC, Cipher.  Is this assumption correct?

 on: February 08, 2021, 07:49:29 pm 
Started by Francois1963 - Last post by misterx
You'll probably have to develop your own fuzzer to do that.

 on: February 08, 2021, 11:41:19 am 
Started by Francois1963 - Last post by Francois1963
I want to test how my WiFi device, a Mediatek 76xx, handles simulated errors, any kind like corruption, in the ICV, TKIP MIC, or Cipher.  The device will pass the packet to the driver with Status bits indicating such errors.  It's that simple.

 on: February 07, 2021, 08:47:33 pm 
Started by Francois1963 - Last post by misterx
You're gonna have to elaborate on what you want to do.

 on: February 07, 2021, 08:46:55 pm 
Started by Karp - Last post by misterx
This is a driver issue, it's not providing packets anymore. There is nothing we can do. You can try contacting nexmon (they have a github repo).

Again, if you're running 64 bit, switch back to 32, because it is still experimental.

 on: February 07, 2021, 12:44:32 pm 
Started by Francois1963 - Last post by Francois1963
Is it possible, and how, to inject messages from a test computer to test security error handling in my device which is in STA mode?  I'm referring to errors in the ICV, TKIP MIC, and Cipher mismatch.

 on: February 07, 2021, 10:17:17 am 
Started by Karp - Last post by ohy1994

Sorry to necro the thread but I have the same problem.

Did a apt update && apt full-upgrade.

Airodump can be run without any problem but whenever I run aireplay-ng -9 wlan0mon, it says injection works but the second time I run it, it doesn't detect any AP. airodump won't work after this as well. After a reboot, everything works again.

Do you require any kinds of log to debug?

I'm running latest kali 32 bit on raspberry pi 4

Pages: 1 ... 8 9 [10]