Results 1 to 9 of 9

Thread: No ARP requests

  1. #1
    Just burned his ISO
    Join Date
    May 2007
    Posts
    18

    Question No ARP requests

    Hi Guys,

    I only just got back into Remote exploit recently and a lots changed.


    I'm using the Alpha AWUS036H with the Realtek chip now which i havent been able to test properly yet.


    I have been following most of the tutorials on this web site and i always get stuck at the same point. My aireplay does not detect any ARP requests even though my deauth has clearly worked. The packets keep going up but no ARP's.

    Any suggestions?


    The Deauth attack is successful beacause my client is forced to reconnect. Here is one of the deauth attacks i was using from the following tutorial.


    aireplay-ng -e DLINK -a 00:11:22:33:44:55 -c 66:77:88:99:00:AA --deauth 10 ath0"

    forums.remote-exploit.org/showthread.php?t=1556&page=16




    Even Xploitz tutorials have the same problem. So it must be something i been missing.


    I had this problem before and have never been able to get past this point.

    Any help is much appreciated. I'm fairly new to Linux compared to Windows. I tried Back Track 3 but my cards drivers are not loaded by default so i stayed with Back Track 2.

  2. #2
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by harbir24_7 View Post
    Hi Guys,

    I only just got back into Remote exploit recently and a lots changed.


    I'm using the Alpha AWUS036H with the Realtek chip now which i havent been able to test properly yet.


    I have been following most of the tutorials on this web site and i always get stuck at the same point. My aireplay does not detect any ARP requests even though my deauth has clearly worked. The packets keep going up but no ARP's.

    Any suggestions?


    The Deauth attack is successful beacause my client is forced to reconnect. Here is one of the deauth attacks i was using from the following tutorial.


    aireplay-ng -e DLINK -a 00:11:22:33:44:55 -c 66:77:88:99:00:AA --deauth 10 ath0"

    forums.remote-exploit.org/showthread.php?t=1556&page=16




    Even Xploitz tutorials have the same problem. So it must be something i been missing.


    I had this problem before and have never been able to get past this point.

    Any help is much appreciated. I'm fairly new to Linux compared to Windows. I tried Back Track 3 but my cards drivers are not loaded by default so i stayed with Back Track 2.
    Thats funny. My bt2 and bt3 load my Alfa 500mW drivers with no problems. Did you try a modprobe, or lspci, or a lsmod????


    You should be using a command line line this>>>

    aireplay-ng -0 5 -e essid -a APmac -c ConnectedClientMacHere wlan0

    but before you do that command....lock your alfa on channel whatever your AP's on. Say its on channel 6 with this example....

    airmon-ng start wlan0 6
    airodump-ng -c 6 -w filename --bssid APmacHere wlan0
    Now a new shell(keep airodump running in the other shell)
    aireplay-ng -0 5 -e ESSID -a APmac -c ConnectedClientMAC wlan0


    BTW what attack you using to crack DA WEP??

    We need more info from ya m8 if were to help ya.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  3. #3
    Just burned his ISO
    Join Date
    May 2007
    Posts
    18

    Default

    Hi Xploitz,

    Well perfectly honest i've had a lot of trouble with my Alpha. When i tried installing it in Windows it kept encountering an error. Turned out it was my firewall.

    Then i tried installing BT on VmWare and that hasnt worked yet but i'd rather get a successful crack first before i resolve that.

    Now i cant get it working in BT3 as your aware.


    Thats funny. My bt2 and bt3 load my Alfa 500mW drivers with no problems. Did you try a modprobe, or lspci, or a lsmod????
    Well i'm not entirely sure what that is so im not really sure.

    You should be using a command line line this>>>

    aireplay-ng -0 5 -e essid -a APmac -c ConnectedClientMacHere wlan0

    but before you do that command....lock your alfa on channel whatever your AP's on. Say its on channel 6 with this example....

    airmon-ng start wlan0 6
    airodump-ng -c 6 -w filename --bssid APmacHere wlan0
    Now a new shell(keep airodump running in the other shell)
    aireplay-ng -0 5 -e ESSID -a APmac -c ConnectedClientMAC wlan0
    I havent tried it the way you mentioned there. I normally use Kismet and use the Capital L which it says it has locked my wlan0 to channel 6

    The commands i use are exactly the ones found in your Tutorial with the exception of my MACs and i needed the essid command which you mentioned in your tutorial.

    I also used the tutorial from the topic i posted earlier which i followed word for word with the exception of the Macs.

    I will post a step by step command a little later on how i am doing things and maybe i can finally get some success!!!

  4. #4
    Member
    Join Date
    Mar 2007
    Posts
    204

    Default

    Some AP's dont respond to certain attacks, try a different method, chop chop/frag seem to work the best on my AP's - also clientless attacks.

    Your booting BT3 in vmware? make sure its ver 6 otherwise you will encounter problems as stated in other threads.

  5. #5
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Also, update your aircrack-ng. We havent had to use the -e essid option for quite some time now.

    Code:
    svn co http://trac.aircrack-ng.org/svn/branch/1.0-dev/ aircrack-ng
    cd aircrack-ng
    gmake SQLITE=true
    gmake SQLITE=true install
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  6. #6
    Just burned his ISO
    Join Date
    May 2007
    Posts
    18

    Question

    Thanks guys.

    I will give one of the other tutorials a go and try the new aircrack-ng.


    I tried it in VmWare 6 Ace (Latest) but it has trouble detecting my Alpha even though its the only one bridged. I didn't get BT2 working beacause of no mouse movement but that was down to me not running the correct OS setting i guess.

    I do actually do a real boot for this from my Desktop Machine and use the laptop to be the client.

    Thanks for trying to shed some light on an age old problem for me any way.

    I'll post my findings and a list of my commands when i give this an attempt either today or tomorrow.


    Could i ask:

    1) Does BT3 beta have the latest aircrack-ng with it?

    2) Xploitz do i need to do anything additional for my BT3 to get it to detect my Alpha or does it run out of the box?

  7. #7
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by harbir24_7 View Post


    Could i ask:

    1) Does BT3 beta have the latest aircrack-ng with it?

    2) Xploitz do i need to do anything additional for my BT3 to get it to detect my Alpha or does it run out of the box?

    BT# have just about the newest version of aircrack-ng. It has a developmental version on it (IDK what version EXACTLY)...but type in

    Code:
     svn co http://trac.aircrack-ng.org/svn/branch/1.0-dev/ aircrack-ng
    cd aircrack-ng
    gmake SQLITE=true
    gmake SQLITE=true install
    And that will give you the VERY latest in the dev version. Its what us seasoned vets and pros use.


    And yes, my alfa 500mW worked right out of the box in BT3 Beta. Nothing else to install. Completely plug and play.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  8. #8
    Just burned his ISO
    Join Date
    May 2007
    Posts
    18

    Default

    I'm sorry Xploitz but like i said I'm rather new to Linux. In order to execute that command i would need the Internet which the Wireless assistant cant detect my Alpha.

    I can actually do your tutorials using CLI beacause i can manually assign my wlan0 but the menu programs don't detect it and so i cant use it there.

    I have just tried your korek chopchop tutorial. Once again i get as far as executing the attack but get no packets with the key.

    Ive also tried the same thing using another one of my AP and its still having the same affect. I tried this with BT3 since my Alpha is being detected in CLI and assigned as wlan0

    Any more suggestions?

  9. #9
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by harbir24_7 View Post
    I'm sorry Xploitz but like i said I'm rather new to Linux. In order to execute that command i would need the Internet which the Wireless assistant cant detect my Alpha.

    I can actually do your tutorials using CLI beacause i can manually assign my wlan0 but the menu programs don't detect it and so i cant use it there.

    I have just tried your korek chopchop tutorial. Once again i get as far as executing the attack but get no packets with the key.

    Ive also tried the same thing using another one of my AP and its still having the same affect. I tried this with BT3 since my Alpha is being detected in CLI and assigned as wlan0

    Any more suggestions?
    If your using BT3 and your alfa is being detected, then you can use these commands to connect to the internet>>>

    ifconfig wlan0 down
    iwconfig wlan0 essid Xploitz key c6e679d9a2
    ifconfig wlan0 up
    dhcpcd wlan0


    What I got bolded above you need to change to your networks name and your wep key. Also, if you have a space or special character in your networks name quote it with double quotes like this>>>

    "-=Xploitz Network=-"
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •