First of all, hi guys, recently found your forums from a post in binrev, thought I join and ask a quick question. I would put this in wireless but, as you know, 3 day grace period for that. Anyway, on to the issue.
I have recently been toying around with backtrack 3, discovered aircrack and decided to pen-test my personal network. So, having never used this particular piece of software before, I find a quick guide for it on backtrack, and these are the commands used:
airmon-ng start wifi0
airodump-ng -c [channel] --bssid [AP MAC] -w [filename] ath1
(auth is successful on this by the way, with the graciously included :-))
aireplay-ng --fakeauth 0 -e [AP SSID] -a [AP MAC] ath1
and, when I used the command line, the crack code:
aireplay-ng -3 -b [AP MAC] ath1 -x 250
aircrack-ng -z -b [AP MAC] [filename*.cap]
Those are the exact commands I entered on my eee 900, in BT3, except replace the items in brackets with their respective parameters, obviously. So, I do all this, everything seems successful, until I get to the actual cracking. Well, I save the .cap file to a thumb drive and transfer it to my gaming rig, thinking that because of the better hardware it would take less time to attempt to crack my hash, which, for the fun of it, I had my brother set to an alpha-numeric value that I do not know. Well, anyway, on the windows box I try both the GUI and the command line, and both times it tells me its WPA and that no handshakes were found. When I try a PTW attempt, it fails, having used only 42 IVs (the cap has 11,000). I am positive the encryption is wep, would there be any reason why it has been taken as a WPA?
Also, in the included .txt file, it says that:
privacy is WPA WEP
Cipher is WEP40 WEP
Any help is appreciated,