Aircrack-ng forum

Please login or register.

Login with username, password and session length
Advanced search  

News:

Aircrack-ng 1.7 release

Pages: 1 ... 6 7 [8] 9 10
 71 
 on: November 25, 2021, 08:39:28 pm 
Started by shanuk331 - Last post by shanuk331
i am new to kali and im learning ethical hacking.
im having trouble at the airodump-ng part
im using Asus ROG Strix G15 with inbuilt wifi adapter.(wifi 6)" Network controller: MEDIATEK Corp. Device 7961  "
i succesfully managed to put the adapter in monitor mode using
 airmon-ng check kill
 airmon-ng start wlan0
i tried the other 2 ways too.
but when i use airodump-ng wlan0mon , it doesnt show anything.
but sometimes it shows 1 network(after 2 or 3 minutes)even though there are lots of wifi network nearby.
Please help me fix it(or help me if im doing something wrong)
Also im using dualboot with windows 10.


Results

iwconfig                   
lo        no wireless extensions.

eth0      no wireless extensions.

wlan0     IEEE 802.11  ESSID:"NiwaasSunny" 
          Mode:Managed  Frequency:2.442 GHz  Access Point: 7C:A9:6B:BD:06:75   
          Bit Rate=6.5 Mb/s   Tx-Power=3 dBm   
          Retry short limit:7   RTS thr:off   Fragment thr:off
          Encryption key:off
          Power Management:on
          Link Quality=36/70  Signal level=-74 dBm 
          Rx invalid nwid:0  Rx invalid crypt:0  Rx invalid frag:0
          Tx excessive retries:0  Invalid misc:7   Missed beacon:0


─# airmon-ng check kill                                                                                      130 ⨯

Killing these processes:

    PID Name
   5595 wpa_supplicant


# airmon-ng start wlan0 


PHY     Interface       Driver          Chipset

phy0    wlan0           mt7921e         MEDIATEK Corp. Device 7961
                (mac80211 monitor mode vif enabled for [phy0]wlan0 on [phy0]wlan0mon)
                (mac80211 station mode vif disabled for [phy0]wlan0)


# iwconfig
lo        no wireless extensions.

eth0      no wireless extensions.

wlan0mon  IEEE 802.11  Mode:Monitor  Frequency:2.457 GHz  Tx-Power=3 dBm   
          Retry short limit:7   RTS thr:off   Fragment thr:off
          Power Management:on
         
                                                                             


# airodump-ng wlan0mon

 CH  1 ][ Elapsed: 18 s ][ 2021-11-26 06:58                                                                         
                                                                                                                   
 BSSID              PWR  Beacons    #Data, #/s  CH   MB   ENC CIPHER  AUTH ESSID                                   
                                                                                                                   
 50:2B:73:3B:96:21  -81        0        4    0   2   -1   WPA              <length:  0>                             
                                                                                                                   
 BSSID              STATION            PWR   Rate    Lost    Frames  Notes  Probes                                 
                                                                                                                   
 50:2B:73:3B:96:21  DC:72:23:FD:60:32   -1    1e- 0      0        2                                                 
 50:2B:73:3B:96:21  58:00:E3:78:AE:A5   -1    0e- 0      0        2                             




# airodump-ng -c 2 --bssid 50:2B:73:3B:96:21 -w /root wlan0mon                                                1 ⨯
06:59:23  Created capture file "/root-10.cap".






 CH  2 ][ Elapsed: 50 s ][ 2021-11-26 06:59                                                                         
                                                                                                                   
 BSSID              PWR RXQ  Beacons    #Data, #/s  CH   MB   ENC CIPHER  AUTH ESSID                               
                                                                                                                   
                                                                                                                   
 BSSID              STATION            PWR   Rate    Lost    Frames  Notes  Probes

 72 
 on: November 24, 2021, 01:35:18 am 
Started by Elle - Last post by Elle
My question is why can an older version of aircrack-ng (v1.2 rc4) crack a WiFi password from a pcap file, but the same pcap file cannot be cracked using the newer aircrack-ng version (1.6)?
In both aircrack-ng version I use the following command:

The data.cap file that I'm using can be found here:
https://traces.simpleweb.org/mooc/wifi/wpa/1/wpa_data.cap

sudo aircrack-ng data.pcap -w list.txt

With the older version I get back the wifi password, but in the newer version I get "Packets contained no EAPOL data; unable to process this AP."

Am I doing something wrong?

 73 
 on: November 22, 2021, 12:04:18 am 
Started by Dl87 - Last post by Dl87
So if I browse websites, then my phone is actively transmitting?

 74 
 on: November 21, 2021, 08:25:55 pm 
Started by Dl87 - Last post by misterx
Browse websites, use apps

 75 
 on: November 20, 2021, 07:19:00 pm 
Started by Dl87 - Last post by Dl87
How do I make sure the phone is actively transmitting?

 76 
 on: November 20, 2021, 05:26:17 pm 
Started by Dl87 - Last post by misterx
Bluetooth also has MAC addresses. You are saying "wifi device Mac address F0:D0:8C:5A:62:E9", so that means this specific mac is for wifi.

 77 
 on: November 20, 2021, 01:17:07 am 
Started by Dl87 - Last post by Dl87
I don't understand the response.

 78 
 on: November 19, 2021, 11:13:19 pm 
Started by Dl87 - Last post by misterx
For the wifi portion, yes.

 79 
 on: November 19, 2021, 06:55:44 pm 
Started by Dl87 - Last post by Dl87
I look under my phone's settings and it says wifi device Mac address F0:D0:8C:5A:62:E9 under about phone. That means it is my phone's Mac address?

 80 
 on: November 19, 2021, 05:15:56 pm 
Started by Dl87 - Last post by misterx
If the phone is not actively transmitting, you won't see anything.

Or your capture device isn't able to capture it: for example when the phone is 802.11ac and the capture device is 802.11n

Pages: 1 ... 6 7 [8] 9 10