Aircrack-ng forum

Please login or register.

Login with username, password and session length
Advanced search  


Aircrack-ng 1.6 release

Pages: 1 ... 8 9 [10]
 on: April 19, 2021, 01:02:57 am 
Started by rachfks - Last post by rachfks
I try to crack my own wifi, but it did not work. any help please?

└─# aircrack-ng snack1-01.cap -w  /usr/share/wordlists/rockyou.txt                                                       1 ⨯
Reading packets, please wait...
Opening snack1-01.cap
Read 61228 packets.

   #  BSSID              ESSID                     Encryption

   1  E4:34:93:5B:E8:C0  Marwan                    WPA (0 handshake)

Choosing first network as target.

Reading packets, please wait...
Opening snack1-01.cap
Read 61228 packets.

1 potential targets

Packets contained no EAPOL data; unable to process this AP.

Quitting aircrack-ng...

 on: April 18, 2021, 05:36:43 pm 
Started by Shivan - Last post by misterx
Not that I can think of

 on: April 18, 2021, 10:27:56 am 
Started by Shivan - Last post by Shivan
Great thanks, I'll try that.

Or is there any other tool for what I'm trying to do?

 on: April 18, 2021, 01:21:48 am 
Started by Shivan - Last post by misterx
You can't really filter by station, but you can use interactive mode. Press the 'a' key to display stations only:

 on: April 17, 2021, 02:22:07 pm 
Started by Shivan - Last post by Shivan

I have a station (client) which is not associated to a BSSID.

How can I filter or sort that this one is marked or at top, so I can watch it easily to check if I am getting nearer or farer?

I'm using airodump-ng and filtered for a BSSID so the upper list won't get too long and my monitored station will get off the screen.

 on: April 17, 2021, 12:23:37 am 
Started by Ozymandias - Last post by misterx
Yes, run 'airmon-ng check kill' before putting it in monitor mode

 on: April 16, 2021, 01:20:46 pm 
Started by Ozymandias - Last post by Ozymandias
Hi There,   

So I'm on a Raspberry Pi CM4 using a RTL88x2bu USB dongle for Wifi..    this setup works fine as a Wifi client and as an access point via hostapd.

The Ubuntu 21.04 aircrack package that is installed is..

Code: [Select]
aircrack-ng/hirsute,now 1:1.6+git20210130.91820bc-1 arm64||

When as root I run airmon-ag I get the following:-
Code: [Select]
# airmon-ng start wlx0013eff402eb

PHY Interface Driver Chipset

phy1 wlx0013eff402eb rtl88x2bu Realtek Semiconductor Corp. RTL88x2bu [AC1200 Techkey]

Error setting channel: command failed: Device or resource busy (-16)
Error -16 likely means your card was set back to station mode by something.
Removing non-monitor wlx0013eff402eb interface...
(monitor mode disabled)

Now the interface is not managed by anything.   and when I use iwconfig to change the mode to monitor and alter the channel it works without problem.

Anyone suggest a course of action?

 on: April 13, 2021, 09:05:05 pm 
Started by RChadwick - Last post by misterx
Just a simple bash script that goes through the list and uses wpa_supplicant will do it.

As for how long it will take, assuming 5 secs (it can probably be done 1sec/try), 5000 seconds (1 hour 20 mins)

 on: April 13, 2021, 06:52:06 pm 
Started by RChadwick - Last post by RChadwick
I have an idea for a new hack, and need some advice. Assuming you know the password is only one of 1000 choices, is directly brute forcing an AP practical? Can Aircrack, or any other tool, try to crack an AP using a dictionary file? How long does each attempt take?

I like a challenge. I have an AP I bought for a dollar at a flea market, and I don't have the Wifi password. Instead of factory resetting it, I wanted to try my new idea. Unfortunately (Or maybe not so) I don't have anything associated with it, and can't get a handshake, nor have I been able to get a PMKID. Yes, I know running 1000 choices through Hashcat wouldn't be difficult or take long. No challenge there. :)

 on: April 08, 2021, 05:58:11 pm 
Started by Tarzan84 - Last post by misterx
You need to put your wireless card in monitor mode.

As usual, errors are typically shown in dmesg.

Pages: 1 ... 8 9 [10]