Aircrack-ng forum

Please login or register.

Login with username, password and session length
Advanced search  


Aircrack-ng 1.6 release

Post reply

Warning: this topic has not been posted in for at least 120 days.
Unless you're sure you want to reply, please consider starting a new topic.
Message icon:

(Clear Attachment)
(more attachments)
Restrictions: maximum individual size 10240KB
Note that any files attached will not be displayed until approved by a moderator.
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Which Aircrack-ng program replays traffic? Lowercase:

shortcuts: hit alt+s to submit/post or alt+p to preview

Topic Summary

Posted by: misterx
« on: August 21, 2013, 07:06:42 am »

No, there is no way to avoid sniffing. It is something passive.
Posted by: jelandj
« on: July 31, 2013, 10:31:00 pm »

the change, feel automatic, there is any other way to avoid sniffed?
Posted by: niceguy
« on: July 31, 2013, 10:11:55 pm »

:) is it a question? I cant see a question mark.. ;) if its a question, most probably the owner of ap sniffed your ATTACK and changed his security protocol to something more safe..  please, do NOT test any ap without owner permission, thanks 8)
Posted by: jelandj
« on: July 31, 2013, 10:02:28 pm »

Why encryption WEP change to a WPA after 10.000 Data
and if I have to keep the same attack or change the attack
to WPA.

Thank You