Aireplay-ng fails to reinject ARP reqs with some APs
7 replies, posted
So, I cracked the router in my own room easily in like a minute thanks to aireplay generating enough data, but trying to crack my other router, it for some reason fails to reinject shizzle, which in turn means I'm not generating enough data, which means it's going to take a damn week to crack it. Anyone who's had this situation before?
[QUOTE=KrAzY_nikomo;19466316]So, I cracked the router in my own room easily in like a minute thanks to aireplay generating enough data, but trying to crack my other router, it for some reason fails to reinject shizzle, which in turn means I'm not generating enough data, which means it's going to take a damn week to crack it. Anyone who's had this situation before?[/QUOTE]
Any idea why it's failing to inject? Either it's not getting enough frames from the router to repeat/reinject, or maybe something's up with the drivers... are you using something other than madwifi drivers? (madwifi seem the most reliable when it comes to WLAN scanning/injection etc., from my experience)
It just randomly fucked up. First I cracked up my primary router (nikomo), worked fine, then tried cracking my other router, didn't work, then I rebooted and tried recracking my primary router (nikomo) and it somehow mysteriously stopped working.
To be honest, I have a feeling it just likes to randomly stop working.
[QUOTE=KrAzY_nikomo;19467130]It just randomly fucked up. First I cracked up my primary router (nikomo), worked fine, then tried cracking my other router, didn't work, then I rebooted and tried recracking my primary router (nikomo) and it somehow mysteriously stopped working.
To be honest, I have a feeling it just likes to randomly stop working.[/QUOTE]
Well it will depend entirely on how many frames the wifi card can actually see, so if you move around.. or move anything else around, or someone's using a microwave, or there's any kind of intermittent interference, you're gonna have different results every time.
Waiting for beacon frame (BSSID) on channel 11
Then it spams sending authentication request (open system)
Argh what the fuck now it worked perfectly. Got my WEP-key at around 35000 data.
Got an access list set up (MAC filter) on the router by any chance? Spoof your mac address to one already present on the network.
I reckon I must have done something stupid like set the channel to a wrong one or something. I'll try again now and then I'll try my other router.
Also, anyone know where I can edit resolution in BT4? 800x600 is pissing me off, I want 1024x600 but I couldn't find any setting. Seriously. checked the system part of the menu, everything.
Now aireplay is being a dick and I didn't manage to inject any packets.
What I do:
airmon-ng start wlan0
airodump-ng wlan0 (get channel and bssid)
airodump-ng -c (channel) -w (filename) --bssid (bssid) wlan0
New terminal
aireplay-ng -1 0 -a (bssid) wlan0
aireplay-ng -3 -b (bssid) wlan0
New terminal
aircrack-ng -b (bssid) (filename-01.cap)
I got the password but I had to connect a client to the AP to get it "talky"
[QUOTE=birkett;19480928]Got an access list set up (MAC filter) on the router by any chance? Spoof your mac address to one already present on the network.[/QUOTE]
Extremely unhandy if nobody is using the AP at the moment :/
Though I understand that's the whole point of MAC-filtering.
Note: I have now figured out why I couldn't get the second router working.
My stupid ass forgot it's using shared key authentication, which means the open system authentication attack won't obviously work.
[QUOTE=KrAzY_nikomo;19483289]
I got the password but I had to connect a client to the AP to get it "talky"
Note: I have now figured out why I couldn't get the second router working.
My stupid ass forgot it's using shared key authentication, which means the open system authentication attack won't obviously work.[/QUOTE]
I assume you're cracking a WPA router, not WEP? Since you're capturing everything, not just IVs. Yeah you have to get a -real-, authenticated client, to connect to the router before you can get the WPA handshake, you can't do it with packet injection. The only thing you can do is to force an already-connected client to Deauth by spamming it with deauth packets, so it has to reauthenticate itself.
[url=http://docs.lucidinteractive.ca/index.php/Cracking_WEP_and_WPA_Wireless_Networks]This is probably the most helpful document I've seen about cracking WEP/WPA keys, by the way, if it's of any help.[/url]
Sorry, you need to Log In to post a reply to this thread.