Please login or register.

Login with username, password and session length
Advanced search  


Pages: [1] 2 3 ... 10
 on: February 24, 2018, 09:09:57 PM 
Started by Jhon Bloh - Last post by misterx
There is no traffic from between the AP and ANY station, only deauth. That doesn't make it immune. If you say it is immune, we should see the traffic between the station and AP continuing but there is none of that.

 on: February 24, 2018, 06:57:13 PM 
Started by Jhon Bloh - Last post by Jhon Bloh
Yea its because the AC AP is immune to the attacks by using the new security. This is what one of the developers said about the new security when someone asked him why did they add this new feature @ubiquiti forum:

"Some customers have reported malicious DEAUTH attacks where the MAC address of the AP is spoofed in a DEAUTH packet, making the clients disconnect. If these are sent regularly, it would look like a DoS attack.

maybe one day aireplay will be able to break that ^_^

 on: February 24, 2018, 06:32:56 PM 
Started by Jhon Bloh - Last post by misterx
The capture files only contain deauth (there is no data or any other packet), most likely from the aireplay-ng attack and it doesn't look like the AP was doing anything.

 on: February 23, 2018, 03:02:08 PM 
Started by Jhon Bloh - Last post by Jhon Bloh
ok but as I told you before without activating the new network security feature Im able to succefully de-authenticate all clients on the AC AP, after activating the new feature aireplay stops having an effect on the same AC AP. I got more pcap info and this time I also attacked the client on the AP. Random guess: maybe data that the AP was giving out before uncrypted  is now encrypted and thats why aireplay cant work on the AP anymore...

 on: February 23, 2018, 02:42:29 PM 
Started by Jhon Bloh - Last post by misterx
Mixed mode means that clients who support 802.11n/ac will connect in ac and your card sending in 802.11bg might not affect them.

 on: February 23, 2018, 01:54:44 PM 
Started by Jhon Bloh - Last post by Jhon Bloh
done! with 2 different computers as you requested. While I was attacking with one device and listening with another the client on my AP did not disconnect. This AC AP is in mixed mode which means that a/ac/n
 is supported and that is why I can attack it using a non AC ALFA radio. Ubiquiti seems to finally beat aireplay de-authentication attacks... Let me know If you need something else Misterx.  8)

 on: February 23, 2018, 01:00:41 PM 
Started by Jhon Bloh - Last post by misterx
So, can you provide a pcap to show what it looks like? Done by another computer than the one running the attack.

 on: February 23, 2018, 12:47:24 PM 
Started by Jhon Bloh - Last post by Jhon Bloh
@misterx before activating the new network security option on my Rocket AC GEN2 I was able to attack my own AC AP with aireplay, but after I updated it to latest beta firmware and activated the new network security option Aireplay de-authentication attacks dont longer work. I confirmed this by watching how my clients stayed connected to the AP while attacking it with aireplay.  Same thing happened when I attacked a client instead of AP.

 on: February 23, 2018, 10:41:45 AM 
Started by Jhon Bloh - Last post by misterx
Your card was probably limited to b/g and the AP configured for n/ac only and that could be why it was ignoring them.

It might also be a technique issue as you don't target the AP usually but the clients directly.

 on: February 23, 2018, 10:40:32 AM 
Started by Lion - Last post by misterx
Those are CPU instructions:

Aircrack-ng has optimized code to take advantage of those instructions to improve cracking speed. SSE2 is the slowest, AVX is faster and AVX2 is even faster. However, not all CPU support AVX/AVX2. Check out using -u parameter in aircrack-ng to see what your CPU supports.

In any case, it won't be useful anymore in the next release as there is a "trampoline" binary to choose the fastest version based on your CPU.

Pages: [1] 2 3 ... 10