Aircrack-ng

Please login or register.

Login with username, password and session length
Pages: 1 ... 8 9 [10]
 91 
 on: October 25, 2018, 09:39:54 AM 
Started by battx726 - Last post by battx726
Thank you!   8)

 92 
 on: October 24, 2018, 02:55:16 PM 
Started by battx726 - Last post by misterx
There is a list in the FAQ in the wiki. One of the first entries.

 93 
 on: October 24, 2018, 08:55:56 AM 
Started by battx726 - Last post by battx726
Hello and greetings!  :)

Newbie here, I'm running kali linux on virtual box using macbook air, software version is Mac OS High Sierra 10.13.6 .  Can someone advice me what external wifi card should I use for packet injection and monitoring that will be compatible with my OS?

Thank you in advance!  8)

 94 
 on: October 20, 2018, 10:27:01 PM 
Started by todin - Last post by todin
This may help: https://docs.google.com/spreadsheets/d/1uJE5YYSP-wHUu5-smIMTmJNu84XAviw-yyTmHyVGmT0/edit

Routers have countermeasures that can make it much more difficult and time consuming.

That seems to be a very helpful document, I will bookmark thank you. Unfortunately I get this result on every router I try and the document claims my "Arris" brand is vulnerable.

Would you say WPS crack with Reaver is just not really a viable option nowadays? Are there better methods in your opinion?

 95 
 on: October 20, 2018, 07:17:32 PM 
Started by todin - Last post by misterx
This may help: https://docs.google.com/spreadsheets/d/1uJE5YYSP-wHUu5-smIMTmJNu84XAviw-yyTmHyVGmT0/edit

Routers have countermeasures that can make it much more difficult and time consuming.

 96 
 on: October 20, 2018, 11:03:43 AM 
Started by todin - Last post by todin
Hello all! Newbie here with a question. It seems there are similar posts all of the internet but I cannot seem to find any solutions for me and sifting through all of this information. Perhaps it is because I was just introduced to Linux this past week but nonetheless here is my issue.

When trying to use reaver on my router, this is what I get immediately after start.

Code: [Select]
root@kali:~# reaver -i wlan1mon -b 38:70:0C:59:73:C5 -vv -c 1

Reaver v1.6.5-git-11-g7c619eb WiFi Protected Setup Attack Tool
Copyright (c) 2011, Tactical Network Solutions, Craig Heffner <cheffner@tacnetsol.com>

[+] Switching wlan1mon to channel 1
[+] Waiting for beacon from 38:70:0C:59:73:C5
[+] Received beacon from 38:70:0C:59:73:C5
[+] Vendor: AtherosC
[+] Trying pin "12345670"
[+] Sending authentication request
[+] Sending association request
[+] Associated with 38:70:0C:59:73:C5 (ESSID: CrockettWifi)
[+] Sending EAPOL START request
[!] Found packet with bad FCS, skipping...
[+] Received deauth request
[!] WARNING: Receive timeout occurred
[+] Sending EAPOL START request
[+] Received deauth request
[!] WARNING: Receive timeout occurred
[+] Sending EAPOL START request
[+] Received deauth request
[!] WARNING: Receive timeout occurred
[+] Sending EAPOL START request
[+] Received deauth request

This will go on and on until I stop it. Here are some specs that may help the situation.

Code: [Select]
K[phy1]wlan1mon ath9k_htc[mac80211]-1.4 Atheros Communications, Inc. AR9271 802.11nK[phy1]wlan1mon ath9k_htc[mac80211]-1.4 Atheros Communications, Inc. AR9271 802.11n
Code: [Select]
Distributor ID: Kali
Description: Kali GNU/Linux Rolling
Release: kali-rolling
Codename: kali-rolling

Linux kali 4.17.0-kali1-amd64 #1 SMP Debian 4.17.8-1kali1 (2018-07-24) x86_64 GNU/Linux

Code: [Select]
wlan1mon: flags=867<UP,BROADCAST,NOTRAILERS,RUNNING,PROMISC,ALLMULTI>  mtu 1500
        unspec 00-0B-0A-4D-CE-D1-33-3A-00-00-00-00-00-00-00-00  txqueuelen 1000  (UNSPEC)
        RX packets 1753713  bytes 493761554 (470.8 MiB)
        RX errors 0  dropped 1636745  overruns 0  frame 0
        TX packets 0  bytes 0 (0.0 B)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

Code: [Select]
BSSID               Ch  dBm  WPS  Lck  Vendor    ESSID
--------------------------------------------------------------------------------
38:70:0C:59:73:C5    1  -27  2.0  No   AtherosC  CrockettWifi

I have tried other arguments on the reaver command but nothing seems to make much of a difference. Any tips on what I am doing wrong? Also I made sure my injections were successful.

Code: [Select]
root@kali:~# aireplay-ng wlan1mon -9
10:01:13  Trying broadcast probe requests...
10:01:13  Injection is working!
10:01:15  Found 20 APs

10:01:15  Trying directed probe requests...
10:01:15  38:70:0C:59:73:C5 - channel: 1 - 'CrockettWifi'
10:01:16  Ping (min/avg/max): 1.637ms/23.061ms/45.325ms Power: -33.00
10:01:16  30/30: 100%

 97 
 on: October 19, 2018, 10:36:51 PM 
Started by kimocoder - Last post by kimocoder
We're working in finishing up the v5.3.4.
v5.2.20(.2) should be used until we're finished.

 98 
 on: October 15, 2018, 03:12:36 PM 
Started by maydinal - Last post by misterx
Could you open a bug report in GitHub and upload the capture file?

 99 
 on: October 15, 2018, 03:01:34 PM 
Started by kimocoder - Last post by misterx
You should always do dist-upgrade, that will solve any potential headache.

 100 
 on: October 15, 2018, 01:26:18 PM 
Started by maydinal - Last post by maydinal
hello;

I am trying to run aircrack-ng on mac os high sierra with below content:

aircrack-ng -1 -a 2 -b <BSSID> <airport_sniff_file> -w <password_list>

but it creates below error:

Opening airportSniffXoP4FY.cap.
Read 21422 packets.

1 potential targets

Assertion failed: (ap_cur->wpa.state > 0), function main, file aircrack-ng.c, line 6738.
Abort trap: 6

I uninstalled and reinstalled aircrack-ng package (aircrack-ng-1.4.high_sierra.bottle.tar.gz) as needed but no change
I also ran airodump-ng-oui-update but still no change, same error message is thrown.

would you please help me to resolve my problem ?
best regards.

Pages: 1 ... 8 9 [10]