Aircrack-ng

Please login or register.

Login with username, password and session length
Pages: 1 2 [3] 4 5 ... 10
 21 
 on: September 27, 2019, 03:35:35 pm 
Started by QuackQuackDuck - Last post by QuackQuackDuck
Sorry for the late reply; ended up taking a different course of action.

1. It is an 802.11 capture, yes. Packetforge recognizes the packet as a valid packet.
2. It is NOT a data packet. It is an action packet. I believe this is my problem.

The approach I took was to use wpa_cli to 'scan', then 'fetch_anqp'. If wpa_supplicant is run with the debug flags, it produces the NAI realms (along with some other hotspot 2.0 info) in the output as a hex dump. I am able to parse this hex dump for the info I need.

Thanks for pointing me in the right direction!

 22 
 on: September 26, 2019, 12:13:12 am 
Started by 1337 - Last post by 1337
Hello,
.
I'm using a fully updated Kali Linux distro on Vmware running Ubuntu 64-bit.


So I've installed the rock you wordlist and have imported a 2.2gb wordlist and I would like to direct Wifite to use these when attempting to crack passwords (for research purposes, obviously).

Also, I've captured several 4 way handshakes successfully and know they can be found at /captures/wifite/hs/ but I have searched my system and cannot find them anywhere. I wanted to feed them through another tool to crack the handshakes and the key.

If anyone can point me in the right direction, I'd appreciate it. I also have a wifipineapple nano which is basically worthless because modules have not been updated in accordance with the firmware.


 23 
 on: September 25, 2019, 12:19:36 pm 
Started by Lincon - Last post by misterx
You should get the latest iw, not that specific version. You have an ancient version of aircrack-ng, you should update. Either using packages (check https://packagecloud.io/aircrack-ng/release ) or by compiling the source code.

Out of curiosity, what OS are you running? And what version of aircrack-ng is that?

 24 
 on: September 25, 2019, 08:44:43 am 
Started by Lincon - Last post by Lincon
Hello everyone,,
I'm new to using aircrack-ng and have been trying to find answers to this situation online and have had no success. There seems to be always a slight difference to my situation. My main doubt is that my wireless card is not apt for using aircrack-ng but I need to be sure and what I should purchase if need to get this to work. I have an intel 5100 with drivers iwlwif [phy0] and interface wlan0.

When I run airmon-ng start wlan0 I get the following:

root@ubuntu:~# airmon-ng start wlan0


Found 4 processes that could cause trouble.
If airodump-ng, aireplay-ng or airtun-ng stops working after
a short period of time, you may want to kill (some of) them!
-e
PID   Name
828   avahi-daemon
829   avahi-daemon
954   NetworkManager
1079   wpa_supplicant


Interface   Chipset      Driver

wlan0      Intel 5100   iwlwifi - [phy0]
reverse image search email checker port checker
ERROR: Neither the sysfs interface links nor the iw command is available.
Please download and install iw from
https://www.kernel.org/pub/software/network/iw/iw-3.10.tar.bz2

I've attempted downloading the iw-3.10.tar.bz2 but I fail in compiling it... I'm stuck and cannot find an answer. If the answer is my wireless card is not supported or cannot do this I would like to know, or if there is a way with my card could someone please help explain it to me.

Greatly Appreciated!

 25 
 on: September 24, 2019, 01:20:35 pm 
Started by Grotte - Last post by misterx
We're aware of Ctrl-C and Ctrl-Z. It happens on Linux as well.

 26 
 on: September 24, 2019, 01:05:51 pm 
Started by tqk_ac - Last post by Illuminaris
After a lot of installing i still get this error when starting the aircrack-ng-gui.py

Traceback (most recent call last):
  File "/usr/local/bin/aircrack-ng-gui.py", line 4, in <module>
    __import__('pkg_resources').run_script('aircrack-ng-gui==1.0', 'aircrack-ng-gui.py')
  File "/usr/lib/python2.7/dist-packages/pkg_resources/__init__.py", line 666, in run_script
    self.require(requires)[0].run_script(script_name, ns)
  File "/usr/lib/python2.7/dist-packages/pkg_resources/__init__.py", line 1468, in run_script
    script_code = compile(script_text, script_filename, 'exec')
  File "/usr/local/lib/python2.7/dist-packages/aircrack_ng_gui-1.0-py2.7.egg/EGG-INFO/scripts/aircrack-ng-gui.py", line 231
    command_airmon_start= f"sudo airmon-ng start {interface}"

 27 
 on: September 24, 2019, 06:57:25 am 
Started by Grotte - Last post by Grotte
Using aircrack-ng 1.4 I have no issue quitting the process using ^c or stopping/backgrounding the process using ^z. But with 1.52 and git master, ^c no longer works for me in both wordlist and stdin mode. And ^z no longer works for me in stdin mode.

When using ^c in wordlist mode, I briefly see a the message `Quitting aircrack-ng`, but it keeps processing. In stdin mode, ^c has no effect, it doesn't even print the message.
When using ^z in stdin mode, it has no effect. So in stdin mode I have to use a different shell to send SIGKILL or SIGSTOP to the process.

OS: macOS Mojave (10.14.6)
wordlist command:
Code: [Select]
aircrack-ng -p 2 -e xxx -w /tmp/wordlist.txt xxx.capstdin command:
Code: [Select]
pskracker -t nvg599 | aircrack-ng -p 2 -e xxx -w - xxx.cap
Code: [Select]
$ stty -a
speed 38400 baud; 20 rows; 150 columns;
lflags: icanon isig iexten echo echoe echok echoke -echonl echoctl
-echoprt -altwerase -noflsh -tostop -flusho pendin -nokerninfo
-extproc
iflags: -istrip icrnl -inlcr -igncr -ixon ixoff ixany imaxbel iutf8
-ignbrk brkint -inpck -ignpar -parmrk
oflags: opost onlcr -oxtabs -onocr -onlret
cflags: cread cs8 -parenb -parodd hupcl -clocal -cstopb -crtscts -dsrflow
-dtrflow -mdmbuf
cchars: discard = ^O; dsusp = ^Y; eof = ^D; eol = <undef>;
eol2 = <undef>; erase = ^?; intr = ^C; kill = ^U; lnext = ^V;
min = 1; quit = ^\; reprint = ^R; start = ^@; status = ^T;
stop = ^@; susp = ^Z; time = 0; werase = ^W;

 28 
 on: September 22, 2019, 02:23:58 pm 
Started by benoit - Last post by WartHawg113
Hey, do you think you can explain some more about the interfaces? I'm not completely clear on how to use them as you said was necessary in your post.

 29 
 on: September 22, 2019, 11:55:26 am 
Started by Galaxy - Last post by misterx
Code has drastically been improved for CPU, and it takes advantage of AVX/AVX2 and even AVX512 when available, so maximizing CPU performance. It always has used all core, unless specified by the user.

You should definitely check the blog. There is an older post talking about performance, but it has improved a bit since: https://aircrack-ng.blogspot.com/2018/07/aircrack-ng-v13.html

 30 
 on: September 22, 2019, 12:06:03 am 
Started by Galaxy - Last post by Galaxy2019
Can I ask if Aircrack-ng will ever implent GPUs or APUs in the future. I started long ago. My older name was Black101726 years ago and since Aircrack-ng in BT4r2 I haven't seen anything but CUDA options that is all. I have to say the CPU speeds jumped a major improvement but it will never be the same :( Aircrack-ng was based on WEP for fast numerical out put at the time. Over the years Encryption in the packet got more tougher than numerical, I thought to my self, maybe Aicrack-ng would get a architect to redesign the CPU on each cores for maximum speed amount but doesn't look like its going that route but stuck at what CPU can handle at the maxium amount.

Anyways. Love the Program. 

Pages: 1 2 [3] 4 5 ... 10