Please login or register.

Login with username, password and session length
Advanced search  


Aircrack-ng 1.6 release

Post reply

Message icon:

(Clear Attachment)
(more attachments)
Restrictions: maximum individual size 10240KB
Note that any files attached will not be displayed until approved by a moderator.
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Which Aircrack-ng program captures traffic? Lowercase:

shortcuts: hit alt+s to submit/post or alt+p to preview

Topic Summary

Posted by: misterx
« on: September 10, 2020, 02:29:04 pm »

Corrupted frames
Posted by: Oreno
« on: September 09, 2020, 09:32:29 pm »

Is there any other reason you can think of? Especially for the garbled junk probes? I seem to get both the plausible passwords and garbled junk pretty much everywhere I scan for a prolonged period of time.

I doubt that the reason it is appearing is because of many people entering the psk in the SSID field, since the majority of the time the SSID is already filled out when attempting to connect and you just need to enter the psk in the password field.
Posted by: misterx
« on: September 09, 2020, 09:22:02 pm »

it is possible, but it would be a mistake people did when setting up the SSID, and instead put the passphrase.
Posted by: Oreno
« on: September 09, 2020, 06:37:58 pm »

Could you post the pcap?

Hi, I joined this forum just to point this out too. Might this be a new attack vector for wifi hacking? Probes giving plaintext passwords? I will share some screenshots of my findings. They appear to be passwords (common psk charsets A-F0-9), but I could not corroborate that they work.

I also got some very strange probes containing what appears to be garbled junk because the passwords do not match.

Please see attached screenshots.
Posted by: efa
« on: July 29, 2020, 11:44:19 am »

i also found a password in probe .....but how ?
 8) 8)
Posted by: misterx
« on: July 11, 2017, 03:07:00 pm »

Could you post the pcap?
Posted by: TomRiddle
« on: July 11, 2017, 01:25:07 pm »

Hi all.
Today while casually scanning the networks around me with airodump-ng
I have noticed that on one device the probe attribute contained the name
the AP it is connected to but also the password.

as you can see there is a "sh****" which is the AP's name and a "05..." which is the password.
Does anyone have an idea on what and why did it happened?
if it helps then the router's manufacture is "ADB Broadband Italia" and
the connected device is a huawei device.