Hi, I'm using BT2 with upgraded aircrack suit (ver 0.9.3)
I have an atheros chipset and I successfuly started it in monitor mode with
I have tried "Interactive packet replay"
airmon-ng stop ath0
airmon-ng start wifi0 3
with the command:
I have checked the injected packets with a true wifi sniffer.
aireplay-ng -2 -b <AP MAC> -d FF:FF:FF:FF:FF:FF -t 1 ath0
they seemed to be fine.
the destination MAC was FF:FF:FF:FF:FF:FF
and the source MAC was the same MAC of the associated client.
and my REAL MAC was not mentioned in the injected packets.
so , everything seems to be OK, since in this kind of attack I don't need to associate my REAL MAC, right?
but I didn't succeed to increase the IVs.
so, whats going on here?
why the AP does not respond to those injected packets?
mybe some security settings in the AP ?
as I know , I configured the AP without additional securtiy settings.. but since I'm newbie , whos knows..