Aircrack-ng forum

Please login or register.

Login with username, password and session length
Advanced search  

News:

Aircrack-ng 1.6 release

Pages: [1] 2 3 ... 10
 1 
 on: December 01, 2021, 08:35:58 pm 
Started by shanuk331 - Last post by misterx
Anything in dmesg?

 2 
 on: December 01, 2021, 02:45:14 pm 
Started by shanuk331 - Last post by shanuk331
└─# airodump-ng --band a wlan0mon                                   




 CH 161 ][ Elapsed: 1 min ][ 2021-12-02 01:42                                           
                                                                                       
 BSSID              PWR  Beacons    #Data, #/s  CH   MB   ENC CIPHER  AUTH ESSID       
                                                                                       
                                                                                       
 BSSID              STATION            PWR   Rate    Lost    Frames  Notes  Probes     
                                                                                       
Quitting...                                                                             
                                                                                       


 
└─# uname -a
Linux HackerMwonu 5.14.0-kali4-amd64 #1 SMP Debian 5.14.16-1kali1 (2021-11-05) x86_64 GNU/Linux
                                                                                       




└─# aircrack-ng | head

  Aircrack-ng 1.6  - (C) 2006-2020 Thomas d'Otreppe
  https://www.aircrack-ng.org

  usage: aircrack-ng [options] <input file(s)>

  Common options:

      -a <amode> : force attack mode (1/WEP, 2/WPA-PSK)
      -e <essid> : target selection: network identifier
                                                                 

 3 
 on: November 25, 2021, 09:14:08 pm 
Started by Elle - Last post by misterx
If I remember correctly, in the older version, it was fairly loose in the requirements for the handshake. On one hand, that helped in cases like these, but on the other hand, it was sometimes selecting the wrong frames, and failed to crack it.

I could see possibly having an option to use the older behavior to select the handshake.

 4 
 on: November 25, 2021, 09:00:44 pm 
Started by shanuk331 - Last post by misterx
You seem to do things right: killing the network managers then starting monitor mode.

Could you try running on the 5GHz band, with 'airodump-ng --band a wlan0mon'? While unlikely, it is possible the APs are in the 5GHz band.

Could you check dmesg to see if there are any error messages (after running any airodump-ng command)?

What kali version do you have, and can you run 'uname -a' as well as 'aircrack-ng | head' then post the results?

 5 
 on: November 25, 2021, 08:39:28 pm 
Started by shanuk331 - Last post by shanuk331
i am new to kali and im learning ethical hacking.
im having trouble at the airodump-ng part
im using Asus ROG Strix G15 with inbuilt wifi adapter.(wifi 6)" Network controller: MEDIATEK Corp. Device 7961  "
i succesfully managed to put the adapter in monitor mode using
 airmon-ng check kill
 airmon-ng start wlan0
i tried the other 2 ways too.
but when i use airodump-ng wlan0mon , it doesnt show anything.
but sometimes it shows 1 network(after 2 or 3 minutes)even though there are lots of wifi network nearby.
Please help me fix it(or help me if im doing something wrong)
Also im using dualboot with windows 10.


Results

iwconfig                   
lo        no wireless extensions.

eth0      no wireless extensions.

wlan0     IEEE 802.11  ESSID:"NiwaasSunny" 
          Mode:Managed  Frequency:2.442 GHz  Access Point: 7C:A9:6B:BD:06:75   
          Bit Rate=6.5 Mb/s   Tx-Power=3 dBm   
          Retry short limit:7   RTS thr:off   Fragment thr:off
          Encryption key:off
          Power Management:on
          Link Quality=36/70  Signal level=-74 dBm 
          Rx invalid nwid:0  Rx invalid crypt:0  Rx invalid frag:0
          Tx excessive retries:0  Invalid misc:7   Missed beacon:0


─# airmon-ng check kill                                                                                      130 ⨯

Killing these processes:

    PID Name
   5595 wpa_supplicant


# airmon-ng start wlan0 


PHY     Interface       Driver          Chipset

phy0    wlan0           mt7921e         MEDIATEK Corp. Device 7961
                (mac80211 monitor mode vif enabled for [phy0]wlan0 on [phy0]wlan0mon)
                (mac80211 station mode vif disabled for [phy0]wlan0)


# iwconfig
lo        no wireless extensions.

eth0      no wireless extensions.

wlan0mon  IEEE 802.11  Mode:Monitor  Frequency:2.457 GHz  Tx-Power=3 dBm   
          Retry short limit:7   RTS thr:off   Fragment thr:off
          Power Management:on
         
                                                                             


# airodump-ng wlan0mon

 CH  1 ][ Elapsed: 18 s ][ 2021-11-26 06:58                                                                         
                                                                                                                   
 BSSID              PWR  Beacons    #Data, #/s  CH   MB   ENC CIPHER  AUTH ESSID                                   
                                                                                                                   
 50:2B:73:3B:96:21  -81        0        4    0   2   -1   WPA              <length:  0>                             
                                                                                                                   
 BSSID              STATION            PWR   Rate    Lost    Frames  Notes  Probes                                 
                                                                                                                   
 50:2B:73:3B:96:21  DC:72:23:FD:60:32   -1    1e- 0      0        2                                                 
 50:2B:73:3B:96:21  58:00:E3:78:AE:A5   -1    0e- 0      0        2                             




# airodump-ng -c 2 --bssid 50:2B:73:3B:96:21 -w /root wlan0mon                                                1 ⨯
06:59:23  Created capture file "/root-10.cap".






 CH  2 ][ Elapsed: 50 s ][ 2021-11-26 06:59                                                                         
                                                                                                                   
 BSSID              PWR RXQ  Beacons    #Data, #/s  CH   MB   ENC CIPHER  AUTH ESSID                               
                                                                                                                   
                                                                                                                   
 BSSID              STATION            PWR   Rate    Lost    Frames  Notes  Probes

 6 
 on: November 24, 2021, 01:35:18 am 
Started by Elle - Last post by Elle
My question is why can an older version of aircrack-ng (v1.2 rc4) crack a WiFi password from a pcap file, but the same pcap file cannot be cracked using the newer aircrack-ng version (1.6)?
In both aircrack-ng version I use the following command:

The data.cap file that I'm using can be found here:
https://traces.simpleweb.org/mooc/wifi/wpa/1/wpa_data.cap

sudo aircrack-ng data.pcap -w list.txt

With the older version I get back the wifi password, but in the newer version I get "Packets contained no EAPOL data; unable to process this AP."

Am I doing something wrong?

 7 
 on: November 22, 2021, 12:04:18 am 
Started by Dl87 - Last post by Dl87
So if I browse websites, then my phone is actively transmitting?

 8 
 on: November 21, 2021, 08:25:55 pm 
Started by Dl87 - Last post by misterx
Browse websites, use apps

 9 
 on: November 20, 2021, 07:19:00 pm 
Started by Dl87 - Last post by Dl87
How do I make sure the phone is actively transmitting?

 10 
 on: November 20, 2021, 05:26:17 pm 
Started by Dl87 - Last post by misterx
Bluetooth also has MAC addresses. You are saying "wifi device Mac address F0:D0:8C:5A:62:E9", so that means this specific mac is for wifi.

Pages: [1] 2 3 ... 10