Aircrack-ng

Please login or register.

Login with username, password and session length
Pages: [1] 2 3 ... 10
 1 
 on: May 25, 2018, 01:32:30 AM 
Started by aneki - Last post by wakawaka
Cant get my RTL8811AU adaptor to work with Kali 2018.2, need help.....details as below.
RTL8811AU adaptor is ID 0bda:a811 Realtek Semiconductor Corp


===========================================================
root@kali:~# sudo apt-get install build-essential
Reading package lists... Done
Building dependency tree       
Reading state information... Done
build-essential is already the newest version (12.4).
0 upgraded, 0 newly installed, 0 to remove and 649 not upgraded.
root@kali:~# sudo apt-get install bc
Reading package lists... Done
Building dependency tree       
Reading state information... Done
bc is already the newest version (1.07.1-2).
0 upgraded, 0 newly installed, 0 to remove and 649 not upgraded.
root@kali:~# sudo apt-get install linux-headers-`uname -r`
Reading package lists... Done
Building dependency tree       
Reading state information... Done
E: Unable to locate package linux-headers-4.15.0-kali2-amd64
E: Couldn't find any package by glob 'linux-headers-4.15.0-kali2-amd64'
E: Couldn't find any package by regex 'linux-headers-4.15.0-kali2-amd64'

==========================================================
root@kali:~# airmon-ng check kill
ls: cannot access '/sys/class/ieee80211/': No such file or directory

Killing these processes:

  PID Name
  819 wpa_supplicant
  921 dhclient
======================================================
root@kali:~# airmon-ng
ls: cannot access '/sys/class/ieee80211/': No such file or directory

PHY   Interface   Driver      Chipset

===============================================================
root@kali:~# lsusb
Bus 001 Device 003: ID 1b1c:1a90 Corsair Flash Voyager GT
Bus 001 Device 002: ID 0bda:a811 Realtek Semiconductor Corp.
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 002 Device 003: ID 0e0f:0002 VMware, Inc. Virtual USB Hub
Bus 002 Device 002: ID 0e0f:0003 VMware, Inc. Virtual Mouse
Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
================================================================
root@kali:~# git clone -b v5.1.5 https://github.com/aircrack-ng/rtl8812au.git
Cloning into 'rtl8812au'...
remote: Counting objects: 3718, done.
remote: Compressing objects: 100% (12/12), done.
remote: Total 3718 (delta 2), reused 5 (delta 0), pack-reused 3706
Receiving objects: 100% (3718/3718), 7.98 MiB | 127.00 KiB/s, done.
Resolving deltas: 100% (2473/2473), done.

root@kali:~# cd rtl*

root@kali:~/rtl8812au# sudo ./dkms-install.sh
About to run dkms install steps...

Creating symlink /var/lib/dkms/rtl8812au/5.1.5/source ->
                 /usr/src/rtl8812au-5.1.5

DKMS: add completed.
Error! echo
Your kernel headers for kernel 4.15.0-kali2-amd64 cannot be found at
/lib/modules/4.15.0-kali2-amd64/build or /lib/modules/4.15.0-kali2-amd64/source.
Error! echo
Your kernel headers for kernel 4.15.0-kali2-amd64 cannot be found at
/lib/modules/4.15.0-kali2-amd64/build or /lib/modules/4.15.0-kali2-amd64/source.
Finished running dkms install steps.
root@kali:~/rtl8812au#

========================================================
root@kali:~# uname -r
4.15.0-kali2-amd64


root@kali:~# apt install linux-headers-4.15.0-kali2-amd64
Reading package lists... Done
Building dependency tree       
Reading state information... Done
E: Unable to locate package linux-headers-4.15.0-kali2-amd64
E: Couldn't find any package by glob 'linux-headers-4.15.0-kali2-amd64'
E: Couldn't find any package by regex 'linux-headers-4.15.0-kali2-amd64'

root@kali:~# apt install linux-image-4.15.0-kali2-amd64
Reading package lists... Done
Building dependency tree       
Reading state information... Done
linux-image-4.15.0-kali2-amd64 is already the newest version (4.15.11-1kali1).
linux-image-4.15.0-kali2-amd64 set to manually installed.
0 upgraded, 0 newly installed, 0 to remove and 649 not upgraded.
===========================================================

 2 
 on: May 24, 2018, 11:58:03 AM 
Started by freeroute - Last post by misterx
You can't. You'll have to do it manually with iw.

 3 
 on: May 24, 2018, 08:15:13 AM 
Started by freeroute - Last post by freeroute
Hi,
How can I create multiple, monitor virtual intefaces with airmon-ng?
It creates only 1 wlan1mon interface only.
I would like to create multiple virtual interfaces wlan1mon, wlan1mon2, etc.

Thanks,

 4 
 on: May 22, 2018, 09:55:43 AM 
Started by chousa47 - Last post by Derlis
So, Have you not found any solution? I have the same problem, I do not know if it is an installation problem but it does not allow me to access the monitor mode, I need help

 5 
 on: May 21, 2018, 11:53:51 AM 
Started by hogwarts - Last post by misterx
@strasharo, you are answering a topic that is 2 years old. A quick look in the wiki would tell you to get to wikidevi and you can get the answer there.

 6 
 on: May 21, 2018, 11:51:05 AM 
Started by hogwarts - Last post by strasharo
Hi guys!  :)
I can confirm that RT3072 works out of the box (i have a totolink USB with this chipset) and is fully compatible with aircrack-ng suite using default
Is that Totolink N300UA? Does it inject fine as well?

 7 
 on: May 19, 2018, 10:03:02 PM 
Started by wakawaka - Last post by wakawaka
captured another 5 million ivs, total 10 million ivs in 2 files.
that did the trick.
shanghai dare global router

 8 
 on: May 19, 2018, 12:45:37 PM 
Started by wakawaka - Last post by misterx
As usual, try any combinations:
- KoreK with different key size
- split files

 9 
 on: May 19, 2018, 03:36:29 AM 
Started by wakawaka - Last post by wakawaka
have always been able to crack wep with 1.5 million ivs max before (usually less than 40000 ivs, sometime 150000 ivs). but for the first time even 5 million ivs doesn't cut it.
--so anyone have experience cracking wep with more than 5 millions ivs ? what is the max you have done before
--any advice or pointers or different parameter switches to try are appreciated

==========================================================================
C:\aircrack\bin\64bit>aircrack-ng.exe -b ##:##:##:## ##:## Aircrack-ng 1.2 scan1.ivs
Opening scan1.ivs
Attack will be restarted every 5000 c[00:00:09] Tested 1 keys (got 5191532 IVs)
Starting PTW attack with 5191560 ivs
Aircrack-ng 1.2
....
....
Failed. Next try with 5195000 IVs.
==========================================================================

cheers

 10 
 on: May 09, 2018, 11:14:03 AM 
Started by Widget - Last post by misterx
Probably

Pages: [1] 2 3 ... 10