Page 1 of 2 12 LastLast
Results 1 to 10 of 17

Thread: fake authentication not working

  1. #1
    Just burned his ISO
    Join Date
    Dec 2008
    Posts
    4

    Default fake authentication not working

    I am trying to crack WEP on my AP but i can't make fake authentication work:

    Code:
    bt ~ # aireplay-ng -1 0 -a 00:14:7F:27:11:5D -h 00:1B:11:B7:5D:10 wifi0
    22:38:16  Waiting for beacon frame (BSSID: 00:14:7F:27:11:5D
    
    22:38:16  Sending Authentication Request (Open System)
    
    22:38:18  Sending Authentication Request (Open System)
    
    22:38:20  Sending Authentication Request (Open System)
    
    22:38:22  Sending Authentication Request (Open System)
    
    22:38:24  Sending Authentication Request (Open System)
    
    22:38:26  Sending Authentication Request (Open System)
    
    22:38:28  Sending Authentication Request (Open System)
    
    22:38:30  Sending Authentication Request (Open System)
    
    22:38:32  Sending Authentication Request (Open System)
    
    22:38:34  Sending Authentication Request (Open System)
    
    22:38:36  Sending Authentication Request (Open System)
    
    22:38:38  Sending Authentication Request (Open System)
    
    22:38:40  Sending Authentication Request (Open System)
    
    22:38:42  Sending Authentication Request (Open System)
    
    22:38:44  Sending Authentication Request (Open System)
    
    22:38:46  Sending Authentication Request (Open System)
    Attack was unsuccessful. Possible reasons:
    
        * Perhaps MAC address filtering is enabled.
        * Check that the BSSID (-a option) is correct.
        * Try to change the number of packets (-o option).
        * The driver/card doesn't support injection.
        * This attack sometimes fails against some APs.
        * The card is not on the same channel as the AP.
        * You're too far from the AP. Get closer, or lower
          the transmit rate.
    Am only 1 meter away from AP and i dont know if i have MAC address filtering enabled:

    Code:
    Wireless Access Point - SpeedTouchE6281F	
    
    	Configuration
    			
    Interface Enabled:	Yes
    Physical Address:	00:14:7F:27:11:5D
    Network Name (SSID):	SpeedTouchE6281F
    Interface Type:	802.11b/g
    Actual Speed:	54 Mbps
    Channel Selection:	Auto
    Region:	Europe
    Channel:	6
    Allow multicast from Broadband Network:	No
    WMM:	enabled
    
    	Security
    			
    Broadcast Network Name:	Yes
    Allow New Devices:	New stations are allowed (automatically)
    Security Mode:	WEP
    WEP Encryption Key:	1234567890
    Am I doing anything wrong?
    Any sugestions?

    my wireless card is: Intel PRO/Wireless 3945ABG
    my AP:Thompson Speedtouch 780

    Thanks for any help!

  2. #2
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Am only 1 meter away from AP and i dont know if i have MAC address filtering enabled:
    How does one NOT know if they have MAC filtering enabled or not? Log into the Web interface of the device and check it out.
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  3. #3
    Senior Member
    Join Date
    Apr 2008
    Posts
    2,008

    Default

    Unless you have specifically set up MAC filtering it is not enabled. This line also seems to confirm that:
    Allow New Devices: New stations are allowed (automatically)
    -Monkeys are like nature's humans.

  4. #4
    Just burned his ISO
    Join Date
    Dec 2008
    Posts
    4

    Default

    Quote Originally Posted by =Tron= View Post
    Unless you have specifically set up MAC filtering it is not enabled. This line also seems to confirm that:
    thanks!

    so Mac filter is disabled, so fake authentication should work, right?
    But why it doesn't work?

  5. #5
    Just burned his ISO
    Join Date
    Dec 2008
    Posts
    5

    Default

    Could someone please help with this? I am have the exact same issue

  6. #6
    Senior Member
    Join Date
    Apr 2008
    Posts
    2,008

    Default

    Quote Originally Posted by TheLions View Post
    thanks!

    so Mac filter is disabled, so fake authentication should work, right?
    But why it doesn't work?
    Yes assuming all other criteria is met. The possible reasons for why it does not are all listed by the aireplay-ng error message. The most common reason besides a MAC filter is that the attacker is too far away from the AP.
    Attack was unsuccessful. Possible reasons:

    * Perhaps MAC address filtering is enabled.
    * Check that the BSSID (-a option) is correct.
    * Try to change the number of packets (-o option).
    * The driver/card doesn't support injection.
    * This attack sometimes fails against some APs.
    * The card is not on the same channel as the AP.
    * You're too far from the AP. Get closer, or lower
    the transmit rate.
    -Monkeys are like nature's humans.

  7. #7
    Just burned his ISO
    Join Date
    Dec 2008
    Posts
    5

    Default

    I have mac filtering enabled on mine and want to crack it without connecting my other machine to the router wireless. Is there a way to do this? How about if I connect it with a wired. I'd like to crack it without having to connect my laptop. I know the macs on the network so I would know if it works or not.

  8. #8
    Senior Member
    Join Date
    Apr 2008
    Posts
    2,008

    Default

    Quote Originally Posted by burmz0rz View Post
    I have mac filtering enabled on mine and want to crack it without connecting my other machine to the router wireless. Is there a way to do this? How about if I connect it with a wired. I'd like to crack it without having to connect my laptop. I know the macs on the network so I would know if it works or not.
    If you connect using a wired connection the encryption naturally will not be encrypted since WEP is only used for wireless signals. You could of course gain access to the router in this way and try to obtain the key directly from the router settings, but that is a whole different approach.

    To be able to inject packets to an AP using MAC filter you will first need to fake the MAC of your wireless card to match one of the allowed ones. This can be done using the following command:
    Code:
    macchanger --mac 00:11:22:33:44:55 eth1
    Where 00:11:22:33:44:55 is to be replaced by one of the MAC addresses that are allowed and eth1 by your wireless interface.
    -Monkeys are like nature's humans.

  9. #9
    Senior Member secure_it's Avatar
    Join Date
    Feb 2010
    Location
    在這兩者之間 BackTrack是4 FwdTrack4
    Posts
    854

    Default

    I would like to recommend to OP tolower the packet injection rate.set it to
    iwconfig wifi0 rate 1M
    then test with
    aireplay-ng -9 wifi0
    (it will show injection is working)

  10. #10
    Just burned his ISO freebsd_man's Avatar
    Join Date
    Nov 2008
    Posts
    19

    Default

    Quote from aircrack-ng doc:

    MAC access controls enabled on the AP

    If fake authentication is never successful (aireplay-ng keeps sending authentication requests) then MAC address filtering may be in place. This is where the access point will only accept connections from specific MAC addresses. In this case you will need to obtain a valid MAC address by observation using airodump-ng. Do not do a fake authentication for a specific MAC address if the client is active on the AP.
    so simply question:
    what would happen if i try fake authentication for a specific MAC address when the client is active on the AP ?

Page 1 of 2 12 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •