I'm sorry but the search function flooded me with unfitting information so that I am to ask my questions in a new newbie-thread.
I will give you some information about my hardware at first:
I use the USB version of BT3
Senao 2511 CD with an 5db antenna (PRISM 2.5, pcmcia)
I have the following problem:
I activate my wlan1 device and start the monitor mode for finding the wep key from my own wlan with aircrack-ng (school project).
I informed me about the programm and the chipset to use and got the equipment.
1. I started the card with
2. I deactivated the card with
3. I gave me a faked MAC with
ifconfig wlan1 down
4. I reactivated the card with
macchanger --mac 00:11:22:33:44:66
5. I started the monitor mode on channel 6 with
6. I noted down my wlan information
airmon-ng start wlan1 6
7. I started the datalog to file with airodump-ng
So far - not further problems or errors but the truble started now
Now I wanted to start a fakeauth with
and: Game over.
aireplay-ng -1 0 –a (BSSID) –h 00:11:22:33:44:66 wlan1
The AP is not too far away ... the cardpower should be mighty and I have no idea what's going on...
Attack was unsuccesful
I dunno what I did wrong. Has anyone ideas what I have to do? I think the Prism 2.5 chipset is no problem for my aim. It should support the injection...
Thanks for reading my threat and I hope you can help me.
It's certainly a WEP encryption and there's no MAC-filter enabled.
In addition to that I tested it with an other Notebook with a simple chipset and it worked. This should be the evidence that my wlan is not unable to be attacked. The fakeauth worked, too...