Aircrack-ng

Please login or register.

Login with username, password and session length
Advanced search  

News:

Pages: [1] 2 3 ... 10
 1 
 on: February 23, 2018, 03:02:08 PM 
Started by Jhon Bloh - Last post by Jhon Bloh
ok but as I told you before without activating the new network security feature Im able to succefully de-authenticate all clients on the AC AP, after activating the new feature aireplay stops having an effect on the same AC AP. I got more pcap info and this time I also attacked the client on the AP. Random guess: maybe data that the AP was giving out before uncrypted  is now encrypted and thats why aireplay cant work on the AP anymore...

 2 
 on: February 23, 2018, 02:42:29 PM 
Started by Jhon Bloh - Last post by misterx
Mixed mode means that clients who support 802.11n/ac will connect in ac and your card sending in 802.11bg might not affect them.

 3 
 on: February 23, 2018, 01:54:44 PM 
Started by Jhon Bloh - Last post by Jhon Bloh
done! with 2 different computers as you requested. While I was attacking with one device and listening with another the client on my AP did not disconnect. This AC AP is in mixed mode which means that a/ac/n
 is supported and that is why I can attack it using a non AC ALFA radio. Ubiquiti seems to finally beat aireplay de-authentication attacks... Let me know If you need something else Misterx.  8)

 4 
 on: February 23, 2018, 01:00:41 PM 
Started by Jhon Bloh - Last post by misterx
So, can you provide a pcap to show what it looks like? Done by another computer than the one running the attack.

 5 
 on: February 23, 2018, 12:47:24 PM 
Started by Jhon Bloh - Last post by Jhon Bloh
@misterx before activating the new network security option on my Rocket AC GEN2 I was able to attack my own AC AP with aireplay, but after I updated it to latest beta firmware and activated the new network security option Aireplay de-authentication attacks dont longer work. I confirmed this by watching how my clients stayed connected to the AP while attacking it with aireplay.  Same thing happened when I attacked a client instead of AP.

 6 
 on: February 23, 2018, 10:41:45 AM 
Started by Jhon Bloh - Last post by misterx
Your card was probably limited to b/g and the AP configured for n/ac only and that could be why it was ignoring them.

It might also be a technique issue as you don't target the AP usually but the clients directly.

 7 
 on: February 23, 2018, 10:40:32 AM 
Started by Lion - Last post by misterx
Those are CPU instructions:
- https://en.wikipedia.org/wiki/SSE2
- https://en.wikipedia.org/wiki/Advanced_Vector_Extensions

Aircrack-ng has optimized code to take advantage of those instructions to improve cracking speed. SSE2 is the slowest, AVX is faster and AVX2 is even faster. However, not all CPU support AVX/AVX2. Check out using -u parameter in aircrack-ng to see what your CPU supports.

In any case, it won't be useful anymore in the next release as there is a "trampoline" binary to choose the fastest version based on your CPU.

 8 
 on: February 23, 2018, 07:59:57 AM 
Started by Lion - Last post by Lion
The title is self-explanatory :)

 9 
 on: February 22, 2018, 11:41:37 PM 
Started by Jhon Bloh - Last post by Jhon Bloh
Ubiquiti will soon release a new firmware where this attack wont work anymore on AC APs. Firmware 8.5.1 will prevent this attack from working. I tested it with firmware 8.5.1-beta 3 and it worked.  so, @misterx is there any new de-authentication attack method in plan? Guess other companies will follow this new security.

 10 
 on: February 22, 2018, 11:11:23 AM 
Started by Zewix974 - Last post by misterx
Don't post in "Useful stuff", thread get moved there.

Second, please take the time to read the documentation. Airolib-ng is what you're looking for.

Pages: [1] 2 3 ... 10