Page 1 of 2 12 LastLast
Results 1 to 10 of 16

Thread: Realtek 8187SE mini wireless card

  1. #1
    Just burned his ISO
    Join Date
    Feb 2009
    Posts
    22

    Default Realtek 8187SE mini wireless card

    On my netbook , I have Realtek's 8187SE wireless card.
    I am not sure what is the correct module for this card.
    When I installed Backtrack 4 , my card was not recognized.
    So I got a driver from:
    code(dot)google(dot)com/p/msi-wind-linux/wiki/installer

    Installed it and now my card is recognized when I insert the module with "modprobe r8180"
    However, when I try aircrack-ng , injection is not working.

    Then I found the driver at :
    www(dot)aircrack-ng(dot)org/doku.php?id=r8187&s=8187

    I patched it and tried to insert it with "modprobe r8187" , however it fails with "unkown symbol in module, or unknown parameter" message.

    I am not sure which driver is the correct one that I can use with injection.
    Can anyone tell me what I should use ?

  2. #2
    Just burned his ISO
    Join Date
    Feb 2009
    Posts
    22

    Default

    additionally, I found another driver specially for my wireless card (realtek 8187SE):
    http : // wiki . msiwind . net/index.php/Ubuntu_8.04_Hardy_Heron#Option_2:_Compiling_Driver s_for_the_Supplied_Wireless_Card

    it is reported to work with injection but I can't compile it. I get a lot of errors.
    I think it is because of the new kernel used in BT4.
    How can I solve this ?

  3. #3
    Just burned his ISO
    Join Date
    Feb 2009
    Posts
    22

    Default

    I am not sure if I am on the correct path.
    can anyone who has knowledge help me ?

  4. #4
    Junior Member
    Join Date
    Feb 2009
    Posts
    41

    Default

    on the page http : // wiki . msiwind . net/index.php/Ubuntu_8.04_Hardy_Heron#Option_2:_Compiling_Driver s_for_the_Supplied_Wireless_Card
    you posted, read further down, there is a download for Ubuntu intrepid (8.10), thats the one you want (intrepid kernel is 2.6.27, bt4 is 2.6.28 ), the problem w/ some wireless chipsets with old drivers in new kernels is the kill_proc funcion that was removed from the linux kernel in 2.6.26, if you're an experienced programmer you can compare the Realtek driver for current (which is likely the one without injection) to compiling the old, injection supported, driver, and change whats depricated. that's not recommended unless you know what your doing though :P

  5. #5
    Just burned his ISO
    Join Date
    Feb 2009
    Posts
    22

    Default

    Hi,

    I am not that skilled. Is there a ready driver which I can use on BT4 for injecion ?

    If not, Can anyone prepare it for us who have a Realtek 8187SE ?

  6. #6
    Senior Member
    Join Date
    Aug 2007
    Posts
    916

    Default

    The driver I believe is in beta stages so its not stable and I don't think there's any injection support yet.

  7. #7
    Just burned his ISO
    Join Date
    Feb 2009
    Posts
    22

    Default

    Quote Originally Posted by hatake_kakashi View Post
    The driver I believe is in beta stages so its not stable and I don't think there's any injection support yet.
    will it ever have injection support ?
    what do you think ?

  8. #8
    Senior Member
    Join Date
    Aug 2007
    Posts
    916

    Default

    It may support injection in the future but this depends on many factors:
    1) the stability of the driver
    2) if one of the aircrack-ng devs or possibly bt devs laying hands on devices with this chipset and are stuck in a situation where they have no choice but to develop it.
    3) someone who kindly donates such items to devs for better support possibly including injection. Either that or becoming a lab rat for the sake of everyone else.
    4) someone donating money to the developers so they can develop better hardware/software/drivers and possibly injection.

  9. #9
    Just burned his ISO
    Join Date
    Feb 2009
    Posts
    22

    Default not about injection

    ok, this time I will not ask about injection.
    I have more generic problem with Realtek 8187se wifi card.

    At home, I am using a home made Linux wifi router, running hostapd on a Atheros wireless card. Only WPA2-PSK is accepted.

    My Windows client can connect to it with Realtek 8187se card without any problems.
    However, I couldn't succeed in connecting to this network from Backtrack 4 with Realtek 8187se drivers.
    I also tried with Ubuntu 8.10 and 9.04 resulting in failure.
    I get "EAPOL-Key timeout" errors on the hostapd logs.

    The same driver can connect to other WPA1 and WPA2 networks supplied on commercial wifi access points.

    How can I troubleshoot this problem ?

    Here is the full log from hostapd on my access point:
    Code:
    Wireless event: cmd=0x8c03 len=20
    ath0: STA 00:21:85:7e:90:0c IEEE 802.11: associated
      New STA
    madwifi req WPA IE - hexdump(len=256): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    madwifi req RSN IE - hexdump(len=256): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 00 00 00 00 01 00 00 00 1c ee 5c c3 2e f8 41 c0 00 00 00 00 00 00 00 00 01 00 00 00 92 02 20 00 f5 0f 00 00 fd ee 5c c3 ed 89 f6 c1 92 02 20 00 45 02 53 c0 00 00 00 00 01 00 00 00 fc ee 5c c3 fc 7b c3 c4 09 10 83 cd eb 89 f6 c1 96 02 20 00 45 02 53 c0 00 00 00 00 09 00 00 00 00 10 83 cd fc 7b c3 c4 20 cc d8 cf 50 00 00 00 e0 ed f7 c3 08 ef 5c c3 9c ed 5c c3 28 ef 5c c3 90 b0 f1 cf 20 cc d8 cf 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 01 00 00 00 00 00 00 00 00 10 00 00 10 00 00 00 e0 ed f7 c3 00 40 00 00 a0 ba 35 c4 00 e0 5c c3 b4 6e 5a c0 dc 55 c2 48 00 00 00 00 35 fa 02 00 00 00 00 00 99 8a ba 00 00 60 2c cf 00 60 2c cf 01 00 00 00 08 ef 5c c3 bc e9 47 c0 00 60 2c cf 99 8a ba 00 01 00
    ath0: STA 00:21:85:7e:90:0c WPA: event 1 notification
    madwifi_del_key: addr=00:21:85:7e:90:0c key_idx=0
    ath0: STA 00:21:85:7e:90:0c WPA: start authentication
    WPA: 00:21:85:7e:90:0c WPA_PTK entering state INITIALIZE
    madwifi_del_key: addr=00:21:85:7e:90:0c key_idx=0
    madwifi_set_sta_authorized: addr=00:21:85:7e:90:0c authorized=0
    ath0: STA 00:21:85:7e:90:0c IEEE 802.1X: unauthorizing port
    WPA: 00:21:85:7e:90:0c WPA_PTK_GROUP entering state IDLE
    WPA: 00:21:85:7e:90:0c WPA_PTK entering state AUTHENTICATION
    WPA: 00:21:85:7e:90:0c WPA_PTK entering state AUTHENTICATION2
    WPA: 00:21:85:7e:90:0c WPA_PTK entering state INITPSK
    WPA: 00:21:85:7e:90:0c WPA_PTK entering state PTKSTART
    ath0: STA 00:21:85:7e:90:0c WPA: sending 1/4 msg of 4-Way Handshake
    WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
    TX EAPOL - hexdump(len=113): 00 21 85 7e 90 0c 00 80 48 4f 21 8d 88 8e 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 88 db 75 15 22 66 e4 5c 5e 3a aa a8 b2 99 21 4b e9 89 e4 be c8 37 b6 7f 41 a5 54 3b 9a a8 57 4d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    ath0: STA 00:21:85:7e:90:0c WPA: EAPOL-Key timeout
    WPA: 00:21:85:7e:90:0c WPA_PTK entering state PTKSTART
    ath0: STA 00:21:85:7e:90:0c WPA: sending 1/4 msg of 4-Way Handshake
    WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
    TX EAPOL - hexdump(len=113): 00 21 85 7e 90 0c 00 80 48 4f 21 8d 88 8e 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 88 db 75 15 22 66 e4 5c 5e 3a aa a8 b2 99 21 4b e9 89 e4 be c8 37 b6 7f 41 a5 54 3b 9a a8 57 4d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    IEEE 802.1X: 121 bytes from 00:21:85:7e:90:0c
       IEEE 802.1X: version=1 type=3 length=117
    ath0: STA 00:21:85:7e:90:0c WPA: received EAPOL-Key frame (2/4 Pairwise)
    WPA: 00:21:85:7e:90:0c WPA_PTK entering state PTKCALCNEGOTIATING
    WPA: PTK derivation - A1=00:80:48:4f:21:8d A2=00:21:85:7e:90:0c
    WPA: PMK - hexdump(len=32): [REMOVED]
    WPA: PTK - hexdump(len=64): [REMOVED]
    WPA: 00:21:85:7e:90:0c WPA_PTK entering state PTKCALCNEGOTIATING2
    WPA: 00:21:85:7e:90:0c WPA_PTK entering state PTKINITNEGOTIATING
    madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
    ath0: STA 00:21:85:7e:90:0c WPA: sending 3/4 msg of 4-Way Handshake
    WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=8 kde_len=46 keyidx=1 encr=1)
    Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
    TX EAPOL - hexdump(len=169): 00 21 85 7e 90 0c 00 80 48 4f 21 8d 88 8e 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 03 88 db 75 15 22 66 e4 5c 5e 3a aa a8 b2 99 21 4b e9 89 e4 be c8 37 b6 7f 41 a5 54 3b 9a a8 57 4d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1e 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1a b7 ef 84 49 92 5a 87 4a 15 96 14 01 0f b0 1f 00 38 f6 c0 0a 31 76 15 2a ac 50 83 d7 26 a5 ed e4 c9 ea 11 04 cd fc be 32 d8 6b 23 27 53 a9 9b 71 25 ee 28 8e ea ef 77 fe 6b 8b b2 0f 9b ce a4 c6 b3 2c 1b 01 0d a4 79 75 6b
    ath0: STA 00:21:85:7e:90:0c WPA: EAPOL-Key timeout
    WPA: 00:21:85:7e:90:0c WPA_PTK entering state PTKINITNEGOTIATING
    madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
    ath0: STA 00:21:85:7e:90:0c WPA: sending 3/4 msg of 4-Way Handshake
    WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=8 kde_len=46 keyidx=1 encr=1)
    Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
    TX EAPOL - hexdump(len=169): 00 21 85 7e 90 0c 00 80 48 4f 21 8d 88 8e 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 04 88 db 75 15 22 66 e4 5c 5e 3a aa a8 b2 99 21 4b e9 89 e4 be c8 37 b6 7f 41 a5 54 3b 9a a8 57 4d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1e 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7b 7e 03 d6 4f 34 25 63 38 d0 eb 16 eb d1 1e 94 00 38 f6 c0 0a 31 76 15 2a ac 50 83 d7 26 a5 ed e4 c9 ea 11 04 cd fc be 32 d8 6b 23 27 53 a9 9b 71 25 ee 28 8e ea ef 77 fe 6b 8b b2 0f 9b ce a4 c6 b3 2c 1b 01 0d a4 79 75 6b
    ath0: STA 00:21:85:7e:90:0c WPA: EAPOL-Key timeout
    WPA: 00:21:85:7e:90:0c WPA_PTK entering state PTKINITNEGOTIATING
    madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
    ath0: STA 00:21:85:7e:90:0c WPA: sending 3/4 msg of 4-Way Handshake
    WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=8 kde_len=46 keyidx=1 encr=1)
    Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
    TX EAPOL - hexdump(len=169): 00 21 85 7e 90 0c 00 80 48 4f 21 8d 88 8e 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 05 88 db 75 15 22 66 e4 5c 5e 3a aa a8 b2 99 21 4b e9 89 e4 be c8 37 b6 7f 41 a5 54 3b 9a a8 57 4d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1f 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 f0 78 bd d5 1c f2 a2 df 9c 61 08 74 1c da 4e 00 38 f6 c0 0a 31 76 15 2a ac 50 83 d7 26 a5 ed e4 c9 ea 11 04 cd fc be 32 d8 6b 23 27 53 a9 9b 71 25 ee 28 8e ea ef 77 fe 6b 8b b2 0f 9b ce a4 c6 b3 2c 1b 01 0d a4 79 75 6b
    ath0: STA 00:21:85:7e:90:0c WPA: EAPOL-Key timeout
    WPA: 00:21:85:7e:90:0c WPA_PTK entering state PTKINITNEGOTIATING
    madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
    ath0: STA 00:21:85:7e:90:0c WPA: sending 3/4 msg of 4-Way Handshake
    WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=8 kde_len=46 keyidx=1 encr=1)
    Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
    TX EAPOL - hexdump(len=169): 00 21 85 7e 90 0c 00 80 48 4f 21 8d 88 8e 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 06 88 db 75 15 22 66 e4 5c 5e 3a aa a8 b2 99 21 4b e9 89 e4 be c8 37 b6 7f 41 a5 54 3b 9a a8 57 4d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1f 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 3a 7c d9 f5 43 cd 77 4d 4d fc a2 dd 1f 8e 09 00 38 f6 c0 0a 31 76 15 2a ac 50 83 d7 26 a5 ed e4 c9 ea 11 04 cd fc be 32 d8 6b 23 27 53 a9 9b 71 25 ee 28 8e ea ef 77 fe 6b 8b b2 0f 9b ce a4 c6 b3 2c 1b 01 0d a4 79 75 6b
    ath0: STA 00:21:85:7e:90:0c WPA: EAPOL-Key timeout
    WPA: 00:21:85:7e:90:0c WPA_PTK entering state PTKINITNEGOTIATING
    WPA: 00:21:85:7e:90:0c WPA_PTK entering state DISCONNECT
    hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA 00:21:85:7e:90:0c reason 2
    madwifi_sta_deauth: addr=00:21:85:7e:90:0c reason_code=2
    WPA: 00:21:85:7e:90:0c WPA_PTK entering state DISCONNECTED
    WPA: 00:21:85:7e:90:0c WPA_PTK entering state INITIALIZE
    madwifi_del_key: addr=00:21:85:7e:90:0c key_idx=0
    ioctl[IEEE80211_IOCTL_DELKEY]: No such file or directory
    madwifi_del_key: Failed to delete key (addr 00:21:85:7e:90:0c key_idx 0)
    madwifi_set_sta_authorized: addr=00:21:85:7e:90:0c authorized=0
    ioctl[IEEE80211_IOCTL_SETMLME]: No such file or directory
    madwifi_set_sta_authorized: Failed to unauthorize STA 00:21:85:7e:90:0c
    ath0: STA 00:21:85:7e:90:0c IEEE 802.1X: unauthorizing port
    Could not set station 00:21:85:7e:90:0c flags for kernel driver (errno=29).
    ath0: STA 00:21:85:7e:90:0c IEEE 802.11: deauthenticated due to local deauth request
    Wireless event: cmd=0x8c02 len=99
    Custom wireless event: 'STA-TRAFFIC-STAT
    mac=00:21:85:7e:90:0c
    rx_packets=1
    rx_bytes=135
    tx_packets=6
    tx_bytes=866
    '
    Wireless event: cmd=0x8c04 len=20
    ath0: STA 00:21:85:7e:90:0c IEEE 802.11: disassociated

  10. #10
    Just burned his ISO
    Join Date
    Feb 2009
    Posts
    22

    Default

    continueing from the previous post...

    Here's the output from wpa_supplicant:

    Code:
    root@ubuntu:~# wpa_supplicant -Dwext -iwlan0 -c/etc/wpa.conf
    CTRL-EVENT-SCAN-RESULTS 
    Trying to associate with 00:80:48:4f:21:8d (SSID='xeonw' freq=2412
    MHz)
    ioctl[SIOCSIWFREQ]: Operation not supported
    Association request to the driver failed
    CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
    CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
    Associated with 00:80:48:4f:21:8d
    WPA: IE in 3/4 msg does not match with IE in Beacon/ProbeResp
    (src=00:80:48:4f:21:8d)
    WPA: RSN IE in Beacon/ProbeResp - hexdump(len=26): 30 18 01 00 00 0f
    ac 04 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
    WPA: RSN IE in 3/4 msg - hexdump(len=22): 30 14 01 00 00 0f ac 04 01
    00 00 0f ac 04 01 00 00 0f ac 02 0c 00
    CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
    WPA: IE in 3/4 msg does not match with IE in Beacon/ProbeResp
    (src=00:80:48:4f:21:8d)
    WPA: RSN IE in Beacon/ProbeResp - hexdump(len=26): 30 18 01 00 00 0f
    ac 04 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
    WPA: RSN IE in 3/4 msg - hexdump(len=22): 30 14 01 00 00 0f ac 04 01
    00 00 0f ac 04 01 00 00 0f ac 02 0c 00
    CTRL-EVENT-SCAN-RESULTS 
    Trying to associate with 00:80:48:4f:21:8d (SSID='xeonw' freq=2412
    MHz)
    ioctl[SIOCSIWFREQ]: Operation not supported
    Association request to the driver failed
    CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
    CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
    WPA: EAPOL-Key Replay Counter did not increase - dropping packet
    Associated with 00:80:48:4f:21:8d
    WPA: IE in 3/4 msg does not match with IE in Beacon/ProbeResp
    (src=00:80:48:4f:21:8d)
    WPA: RSN IE in Beacon/ProbeResp - hexdump(len=26): 30 18 01 00 00 0f
    ac 04 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
    WPA: RSN IE in 3/4 msg - hexdump(len=22): 30 14 01 00 00 0f ac 04 01
    00 00 0f ac 04 01 00 00 0f ac 02 0c 00
    CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
    WPA: IE in 3/4 msg does not match with IE in Beacon/ProbeResp
    (src=00:80:48:4f:21:8d)
    WPA: RSN IE in Beacon/ProbeResp - hexdump(len=26): 30 18 01 00 00 0f
    ac 04 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
    WPA: RSN IE in 3/4 msg - hexdump(len=22): 30 14 01 00 00 0f ac 04 01
    00 00 0f ac 04 01 00 00 0f ac 02 0c 00
    And this is my wpa.conf:

    Code:
    root@ubuntu:~# vi /etc/wpa.conf
    
    ctrl_interface=/var/run/wpa_supplicant
    
    network={
            ssid="xeonw"
            key_mgmt=WPA-PSK
            proto=WPA2
            pairwise=CCMP
            group=CCMP
            psk="ezergecer9990"
    }

Page 1 of 2 12 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •