Aircrack-ng

Please login or register.

Login with username, password and session length
Advanced search  

News:

Aircrack-ng 1.6 release

Pages: [1] 2 3 ... 10
 1 
 on: Today at 03:21:32 pm 
Started by Shizan - Last post by misterx
How did you install it?
What version of the driver?
What kernel?
What distro?

 2 
 on: March 30, 2020, 06:41:55 pm 
Started by Shizan - Last post by Shizan
Hi guys,I'm experiencing the "famous" issue of airodump-ng that seems to be unable to detect clients connected to a specific access point. My Kali release is 2020.1 (it is installed into a dedicated notebook) and I have run the apt-get update command just this morning. In addition to the integrated dual band network adapter (intel manufacturer), I also use the new Alfa Network AWUS1900 802.11ac (https://www.amazon.it/gp/product/B01MZD7Z76/ref=ppx_yo_dt_b_asin_title_o02_s00?ie=UTF8psc=1; [realtek] ), in order to be capable to get far networks. (So im experiencing the problem with both adapter, with recent drivers installed and if i run aireplay-ng <interface> --test it shows me that injection is working for both). I've also tried to force the reinstall of aircrack tool. Obviously there are multiple clients connected to the access point, that is mine, and that i use to test. I noticed that sometime, like once out of 10, if i disconnect and reconnect one of my others pc, magically it appears. All the day I have been searching for the trick but cannot found. Any help will be appreciated. These are the simple commands i execute:
––––––––––––––––––––––––––––––
1:airmon-ng check kill
––––––––––––––––––––––––––––––
2:airmon-ng start wlan0
––––––––––––––––––––––––––––––
3:airodump-ng wlan0 -c <channel> --bssid <access point ' mac address>
#also tried the option --band with all possibles combinations

 3 
 on: March 27, 2020, 04:57:10 pm 
Started by MountainLogic - Last post by misterx
I thought those were captured from the other side. Could you do so and post the capture. Make sure the capture is not too close to the transmitter.

Send one frame, and capture on the transmitting device, and show what is the resulting frame on the other side.

 4 
 on: March 27, 2020, 04:55:41 pm 
Started by nurain150 - Last post by misterx
What is the exact command line?

 5 
 on: March 26, 2020, 07:31:33 pm 
Started by nurain150 - Last post by nurain150
After generating password with crunch  i passed the file to aircrack, then got this with the capture file.
Opening capi-01.cap
Opening capi-02.cap
read(file header) failed: Success

Quitting aircrack-ng...
please help

 6 
 on: March 24, 2020, 06:24:21 pm 
Started by MountainLogic - Last post by MountainLogic
 misterx, Indeed the local packets look good, but what I'm receiving over the air are mangled and have extra parts added.   

 7 
 on: March 24, 2020, 11:04:28 am 
Started by B@D@B00M! - Last post by B@D@B00M!
Hi! I've come up with a twisted idea.

Let's assume there's an AP with some WPA security and you're in range to intercept all the packets.
Let's also assume that you own a website and write in your logs the time and source and content of every request you get, as well as the time, destination and content of every answer you send.

If someone uses precisely the AP you're monitoring to browse your website, then you know the plaintext version of the packets (the data coming to and from your server), as well as the ciphertext (the data coming to and from the AP you're monitoring).
And you can also match the time of a packet being in the AP's wireless LAN with the time the packet arrives to/departs from your server.
That means you can guess the temporal key used to encrypt those packets.

Of course, it requires that someone browses a website you own. But is it so unlikely? Let's say the user of the AP's wireless LAN sees the website's URL written on an fake advertisment flyer in his/her mailbox or on a fake advertisment poster on the street in front of his/her house. If the ad is especially baiting (let's say it's something lewd, or a huge discount at a supermarket, or an easy way to lose weight or become rich), it might work.


Of course, the TK itself not enough to find the PTK or PSK (although it might give some cryptographic hints to weaken it a little if you also have the nonces in a handshake).
Still, it might be interesting to try.

 8 
 on: March 23, 2020, 08:49:47 am 
Started by dimitrispr - Last post by mrbernabeu
i use same wirless card. its work with kali 2018 but not work with 2019 or 2020.

 9 
 on: March 19, 2020, 07:25:16 pm 
Started by MountainLogic - Last post by misterx
Looks good.

 10 
 on: March 18, 2020, 03:06:10 pm 
Started by Sergio - Last post by misterx
You will likely have to parse the output (display) or the capture file to do so.

Pages: [1] 2 3 ... 10