Please login or register.

Login with username, password and session length
Advanced search  


Aircrack-ng 1.6 release

Post reply

Message icon:

(Clear Attachment)
(more attachments)
Restrictions: maximum individual size 10240KB
Note that any files attached will not be displayed until approved by a moderator.
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Which Aircrack-ng program captures traffic? Lowercase:

shortcuts: hit alt+s to submit/post or alt+p to preview

Topic Summary

Posted by: misterx
« on: February 22, 2021, 07:38:48 pm »

As far as I can see aircrack-ng seem to work fine. However, looking at the output of your tool, it is stuck on the same number (0F003434):

Code: [Select]
dehex -r 0FFF0000

I'm guessing in your case, it is stuck on FFFFFFFF.
Posted by: Fpa
« on: January 08, 2021, 04:27:12 pm »

Any news on the bugfix?
Posted by: Fpa
« on: December 25, 2020, 09:35:29 pm »

I tried using my dehex tool from ( dehex -r 0FFF0000 | aircrack-ng test-01.cap -e test -w - )

Im using aircrack-ng windows when my dehex gets to APPROX. FFFFFFFF, in aircrack-ng it freezes.

I did some poking around, I cant seem to find how or where the overflow occurs....

tried poking in,
- next_key()
- next_dict()
- crack_wpa_thread()
- wpa_receive_passphrase()

youre better at c code than i probably am, so can someone please let me know if you find where the overflow is?

I dont get it, aircrack just freezes up!
Posted by: misterx
« on: December 24, 2020, 08:20:00 pm »

Could you elaborate on the issue you encountered without a video?
Posted by: Fpa
« on: December 23, 2020, 10:07:51 pm »

Code: [Select],1423.msg5026.html#msg5026