Results 1 to 8 of 8

Thread: Backtrack3 - Fake authentication with the AP

  1. #1
    Just burned his ISO
    Join Date
    Nov 2008
    Posts
    3

    Default Backtrack3 - Fake authentication with the AP

    I'm trying to attack my own WEP Wireless Router using Backtrack3 and a Linksys WPC55AG Cardbus Adapter. As I don't have any connected Clients I need to fake authentication with the AP.

    The card supports Monitor Mode and I know the card supports packet injection as I can successfully use this syntax:
    aireplay-ng -9 ath0

    My question relates to aireplay-ng and Sending Authentication Requests successfully.
    When I use the following syntax:

    aireplay-ng -1 0 -a 00:18:F8:B5:F26 -h 00:11:22:33:44:55 ath0

    I get this msg:

    Sending Authentication Request (Open System) [ACK]

    which repeats until I get "Attack was Unsuccessful"

    Signal Str is good (33)

    Any ideas??

  2. #2
    Member
    Join Date
    Jun 2008
    Posts
    129

    Default

    Please can you not use white writing as people using the Default Style can not see it.

    Do you have MAC Filtering on?

  3. #3
    Senior Member
    Join Date
    Apr 2008
    Posts
    2,008

    Default

    Quote Originally Posted by monkey64 View Post
    Signal Str is good (33)

    Any ideas??[/COLOR]
    This does not really tell us anything as the PWR readings given by airodump-ng will vary from one card to another and even depending on the actual driver used. How far you are physically from the AP would be much more helpful information.
    -Monkeys are like nature's humans.

  4. #4
    Just burned his ISO
    Join Date
    Nov 2008
    Posts
    3

    Default

    Quote Originally Posted by =Tron= View Post
    How far you are physically from the AP would be much more helpful information.
    I'm about 10 feet away from the AP. Thanks

  5. #5
    Just burned his ISO
    Join Date
    Nov 2008
    Posts
    3

    Default

    marked.

    I'm not aware of having MAC filtering on. How could I check this?
    Thanks

    Back to the default clrs!

  6. #6
    Just burned his ISO
    Join Date
    Oct 2008
    Posts
    8

    Default

    If packet injection works, my only guess is mac filtering.

  7. #7
    Member
    Join Date
    Sep 2008
    Posts
    306

    Default

    Quote Originally Posted by monkey64 View Post
    marked.

    I'm not aware of having MAC filtering on. How could I check this?
    Thanks

    Back to the default clrs!
    Log on your Webinterface of your Access Point and go to tab security (or something similar).
    Just look for MAC filtering, you'll probably find it.

    But apparently you didn't set up MAC filters, besides you wouldn't ask how to check.

    What you can do is, try using a valid MAC instead of 00:11:22:33:44:55
    Be sensitive in choosing where you ask your question. You are likely to be ignored, or written off as a loser, if you:

    * post your question to a forum where it's off topic
    * post a very elementary question to a forum where advanced technical questions are expected, or vice-versa
    * cross-post to too many different newsgroups
    * post a personal e-mail to somebody who is neither an acquaintance of yours nor personally responsible for solving your problem

  8. #8
    Member
    Join Date
    Jun 2008
    Posts
    129

    Default

    Quote Originally Posted by monkey64 View Post
    marked.

    I'm not aware of having MAC filtering on. How could I check this?
    Thanks
    Try connecting using another wireless device such as a PSP, DS or a cell phone if it has wifi or even another laptop if you can borrow one, failing that, you could borrow another USB wifi stick off someone to try.

    Back to the default clrs!
    Cheers

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •