Results 1 to 4 of 4

Thread: Aircrack-ng encryption mix up?

  1. #1
    Just burned his ISO
    Join Date
    Sep 2008
    Posts
    2

    Default Aircrack-ng encryption mix up?

    First of all, hi guys, recently found your forums from a post in binrev, thought I join and ask a quick question. I would put this in wireless but, as you know, 3 day grace period for that. Anyway, on to the issue.

    I have recently been toying around with backtrack 3, discovered aircrack and decided to pen-test my personal network. So, having never used this particular piece of software before, I find a quick guide for it on backtrack, and these are the commands used:
    Code:
    airmon-ng start wifi0
    Code:
    airodump-ng ath1
    Code:
    airodump-ng -c [channel] --bssid [AP MAC] -w [filename] ath1
    Code:
    aireplay-ng --fakeauth 0 -e [AP SSID] -a [AP MAC] ath1
    (auth is successful on this by the way, with the graciously included :-))
    Code:
    aireplay-ng -3 -b [AP MAC] ath1 -x 250
    and, when I used the command line, the crack code:
    Code:
    aircrack-ng -z -b [AP MAC] [filename*.cap]

    Those are the exact commands I entered on my eee 900, in BT3, except replace the items in brackets with their respective parameters, obviously. So, I do all this, everything seems successful, until I get to the actual cracking. Well, I save the .cap file to a thumb drive and transfer it to my gaming rig, thinking that because of the better hardware it would take less time to attempt to crack my hash, which, for the fun of it, I had my brother set to an alpha-numeric value that I do not know. Well, anyway, on the windows box I try both the GUI and the command line, and both times it tells me its WPA and that no handshakes were found. When I try a PTW attempt, it fails, having used only 42 IVs (the cap has 11,000). I am positive the encryption is wep, would there be any reason why it has been taken as a WPA?

    Also, in the included .txt file, it says that:
    privacy is WPA WEP
    Cipher is WEP40 WEP

    Any help is appreciated,
    -Sintax

  2. #2
    Just burned his ISO
    Join Date
    Aug 2008
    Posts
    21

    Default

    Not sure. TBH, I always assumed that to run a WEP crack and WPA/WPA2 where two different command lines all together.

    WEP being:
    aircrack-ng -z -b [AP MAC] output*.cap
    WPA/WPA2 being:
    aircrack-ng -w password.lst -b [AP MAC] psk*.cap
    Those two lines alone are how I differentiante cracking WEP and WPA/WPA2.

    Have you attempted to use aircrack-ng on your eee 900? See if using it on there works. I'm not senior member or anything, but logically (in my mind) saving it to your thumbdrive and running a more powerful machine should work. But like i said, I don't have that much experience.

    If anything else, check out here:
    hxxp://xxx.aircrack-ng.org/doku.php?id=simple_wep_crack
    Pretty much your How-To guide. If you didn't already know that.

    Let me know how it goes while trying to run it on your eee 900.

  3. #3
    Just burned his ISO
    Join Date
    Sep 2008
    Posts
    2

    Default

    Ok well I've run it the best rig I've got, still telling me no handshakes or just hangs altogether, so I still have nothing =\

  4. #4
    Just burned his ISO
    Join Date
    Sep 2008
    Posts
    4

    Default

    Dont get it..your network has WEP och WPA?
    Try switch encryption mode on your router/ap and then back to ..what you have...

    To crack WPA:
    Sniff the wlan while another computer joins it:
    hxxp://aircrack-ng.org/doku.php?id=cracking_wpa


    To crack WEP

    1) If there is NO computers using the wlan:
    hxxp://aircrack-ng.org/doku.php?id=how_to_crack_wep_with_no_clients
    (That requires packet injection support)

    2) If there IS computers using the wlan:
    hxxp://aircrack-ng.org/doku.php?id=how_to_crack_wep_via_a_wireless_client

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •