Aircrack-ng

Please login or register.

Login with username, password and session length
Advanced search  

News:

Aircrack-ng 1.6 release


Post reply

Warning: this topic has not been posted in for at least 120 days.
Unless you're sure you want to reply, please consider starting a new topic.
Name:
Email:
Subject:
Message icon:

Attach:
(Clear Attachment)
(more attachments)
Restrictions: maximum individual size 10240KB
Note that any files attached will not be displayed until approved by a moderator.
Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Which Aircrack-ng program captures traffic? Lowercase:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: misterx
« on: August 21, 2013, 03:06:42 am »

No, there is no way to avoid sniffing. It is something passive.
Posted by: jelandj
« on: July 31, 2013, 06:31:00 pm »

the change, feel automatic, there is any other way to avoid sniffed?
Thank
Posted by: niceguy
« on: July 31, 2013, 06:11:55 pm »

:) is it a question? I cant see a question mark.. ;) if its a question, most probably the owner of ap sniffed your ATTACK and changed his security protocol to something more safe..  please, do NOT test any ap without owner permission, thanks 8)
Posted by: jelandj
« on: July 31, 2013, 06:02:28 pm »

Why encryption WEP change to a WPA after 10.000 Data
and if I have to keep the same attack or change the attack
to WPA.

Thank You

Jeland