Aircrack-ng forum

Please login or register.

Login with username, password and session length
Advanced search  

News:

Aircrack-ng 1.7 release

Pages: [1] 2 3 ... 10
 1 
 on: August 02, 2022, 11:55:25 am 
Started by Fred Sheehan - Last post by Fred Sheehan
I have been using these Linux drivers with all my pen test distro's, Debian based like Kali and Parrot, Arch based like BlackArch, RPM based like Fedora security spin distro..

They will of course compile and work with any Linux distro if you are just adding tools to your own Linux system.

They work as expected with monitor mode and packet injection and because they are dkms compiled drivers, they will automatically update whenever you update your system or kernel.

https://github.com/morrownr





 2 
 on: August 02, 2022, 11:44:50 am 
Started by Eth0hacker - Last post by Fred Sheehan
For some attacks you actually need 2 adapters, you have to use 1 to masquerade as the access point, and another to be able to de-authenticate the clients of the real AP to try and get them to connect to your twin.

Buy another adapter!

 3 
 on: August 02, 2022, 11:40:51 am 
Started by MHS - Last post by Fred Sheehan
Use a good adpater and attach a larger higher gain aerial to it.

Attackable depends on how their set up..

 4 
 on: July 27, 2022, 06:05:53 pm 
Started by MHS - Last post by MHS
Hello.  I want to use airodump-ng to scan the Wi-Fis around me, is there a way to increase the range of available Wi-Fis?
I hope the translator translated well. :-[

 5 
 on: July 19, 2022, 06:10:47 pm 
Started by Starz14208 - Last post by misterx
Well, the handshake indicates that "word" was used at the time. It might be possible it used the EAPOL frames from someone trying to connect with "word", depending on the version used.

 6 
 on: July 18, 2022, 11:36:03 pm 
Started by Starz14208 - Last post by Starz14208
I ran a test on my home network (spectrum route) with the actual password on a word list, as well as a few versions of our pass phrase. Aircrack returned the password without a 1 at the end.

I was able to get the WPA handshake by deauthing a device.

My network password is “word1” as an example
 Aircrack returned “word” as the password (I had both word1 and word in the word list)

“word” was our password a few months ago but we changed it to “word1” recently. I’m assuming something in the handshake is recognizing that? Thoughts on this?

I’m using “word” as a hypothetical as I’m not giving my real password away.

 7 
 on: July 09, 2022, 08:09:33 pm 
Started by narr0w - Last post by misterx
The code should be pretty helpful. It basically does the computation to see if the passphrase, hashed with the other needed values match what it has from the handshake. If yes, then that's the right passphrase.

You may want to look at hashcat for GPU cracking.

 8 
 on: July 09, 2022, 08:07:33 pm 
Started by Carlos777 - Last post by misterx
It does not appear to be used anymore.

The "MB" in the displayed output is "Speed" in the CSV.

 9 
 on: July 09, 2022, 03:25:02 pm 
Started by Carlos777 - Last post by Carlos777
I'm running airodump-ng v1.6 in kali and writing it to a csv file. I've noticed that some of the columns I'm getting do not match columns documented - probably now out-of-date. For instance, MB does not appear (but I don't care about this one), but my real question is What is the key column? It's usually empty, but sometimes text appears there. See attachment. I've searched all over but never found any documentation on what this column is.

I've deleted the BSSID's and ESSID's in the attachment.


 10 
 on: July 09, 2022, 07:09:57 am 
Started by narr0w - Last post by narr0w
Hello everyone, today i was wondering how does the aircrack program work. For what i have understood so far, once captured a WPA handshake using airodump you feed in the .cap file and a word list, and the programs starts cracking. The problem is that its very slow, and so i wanted to accelerate it using the gpu, but in order to do that, i first need to know what is aircrack trying to break (PSK, PMK, GTK) and how. Thanks in advance to everyone replying

Pages: [1] 2 3 ... 10