Results 1 to 4 of 4

Thread: 8187L need help -=xploitz=-

  1. #1
    Just burned his ISO
    Join Date
    Apr 2009
    Posts
    2

    Default 8187L need help -=xploitz=-

    Hi!
    I am new to BT4 but thought I would give it a go. I am trying to crack my router WEP using a usaw036h RTL8187L chipset. After watching some tutorials I realized my Ethernet card was not like the ones on the videos.

    In the tutorials I have seen (xploitz) they always do this.

    airmon-ng stop ath0
    ifconfig wifi0 down
    macchanger –mac 00:11:22:33:44:55 wifi0
    airmon-ng start wifi0

    airodump-ng –c 6 blah blah ath0

    I tried doing this but I cant get it working

    airmon-ng stop wlan0
    ifconfig mon0 down
    macchanger –mac 00:11:22:33:44:55 mon0
    airmon-ng start wifi0

    When I macchange it says that mon0 does not exist I really want to do this with macchanger.

    Also why is it that -=xploitz=- then uses the ath0 after he started up the wifi0 one? Mistake? Can't find anything here or on google.

    Thank you

  2. #2
    Just burned his ISO
    Join Date
    Apr 2009
    Posts
    2

    Smile noob help awus036h

    OK I think I am doing this right now but I am not sure.

    on awus036h usb

    airmon-ng start wlan0
    ifconfig mon0 down
    macchanger –mac 00:11:22:33:44:55 mon0
    ifconfig mon0 up

    now I can see that the mac of mon0 is 00:11:22:33:44:55

    Should I only use the mon0 vap for everything when I use the aircrack-ng suite?

    Thank you for your help.

  3. #3
    Member imported_onryo's Avatar
    Join Date
    Apr 2009
    Posts
    109

    Default Hope this helps

    Quote Originally Posted by pwn2own View Post
    OK I think I am doing this right now but I am not sure.

    on awus036h usb

    airmon-ng start wlan0
    ifconfig mon0 down
    macchanger –mac 00:11:22:33:44:55 mon0
    ifconfig mon0 up

    now I can see that the mac of mon0 is 00:11:22:33:44:55

    Should I only use the mon0 vap for everything when I use the aircrack-ng suite?

    Thank you for your help.

    http://aircrack-ng.org/doku.php?id=a...o_managed_mode
    mac80211 drivers monitor mode

    See mac80211 versus ieee80211 stacks for some background information.

    When using the mac80211 version of a driver, the use of airmon-ng and the aircrack-ng tools are slightly different.

    Running:

    airmon-ng start wlan0

    Gives something like:

    Interface Chipset Driver

    wlan0 Intel 4965 a/b/g/n iwl4965 - [phy0]
    (monitor mode enabled on mon0)

    Notice that it created “mon0”. You must then use “mon0” in all the subsequent aircrack-ng tools as the injection interface.

    To remove monitor mode enter:

    airmon-ng stop mon0
    *********
    http://aircrack-ng.org/doku.php?id=faq

    If you are using mac80211 drivers and have a mon0 interface then:

    ifconfig mon0 down

    macchanger -a mon0
    Current MAC: 00:0f:b5:88:ac:82 (Netgear Inc)
    Faked MAC: 00:b0:80:3b:1e:1f (Mannesmann Ipulsys B.v.)

    ifconfig mon0 up
    macchanger -s mon0
    Current MAC: 00:b0:80:3b:1e:1f (Mannesmann Ipulsys B.v.)

    onryo
    Let me explain officer, I am not a hacker. I am a security tester of sorts!

  4. #4
    Just burned his ISO
    Join Date
    Apr 2009
    Posts
    5

    Default

    Quote Originally Posted by pwn2own View Post
    Hi!
    I am new to BT4 but thought I would give it a go. I am trying to crack my router WEP using a usaw036h RTL8187L chipset. After watching some tutorials I realized my Ethernet card was not like the ones on the videos.

    In the tutorials I have seen (xploitz) they always do this.

    airmon-ng stop ath0
    ifconfig wifi0 down
    macchanger –mac 00:11:22:33:44:55 wifi0
    airmon-ng start wifi0

    airodump-ng –c 6 blah blah ath0

    I tried doing this but I cant get it working

    airmon-ng stop wlan0
    ifconfig mon0 down
    macchanger –mac 00:11:22:33:44:55 mon0
    airmon-ng start wifi0

    When I macchange it says that mon0 does not exist I really want to do this with macchanger.

    Also why is it that -=xploitz=- then uses the ath0 after he started up the wifi0 one? Mistake? Can't find anything here or on google.

    Thank you
    When using the Orinoco, wifi0 is the parent for all additional arguments/commands to your Network Interface Card (NIC). By starting monitor mode for the NIC (airmon-ng wifi0 <channel to monitor goes here>), the card is devided into a parent directory (wifi0) and the new command or service you created (ath0). If you where to start another command after that, like monitor an additional channel, it would have the name ath1. So wifi0, ath0, and ath1 all now refer to your NIC, each one having a different argument with wifi0 being the parent.
    To remove any of them, use "airmon-ng stop <the name of the argument you don't want like ath1>". You can see the assigned names, they're purpose or state, and they're parent by typing iwconfig. Most atheros cards have the arguments named ath0,1,2, etc.. with the parent wifi0. My Celeron is named eth0, with additional arguments or commands named eth1,2,etc...
    I hope this helped I am also new to security penetration and only joined this network two days agoe but I have 12 years of experience as a Network Systems Admin. with an Associates in Telecommunications and am now studying computer science and as you can see, network security. So if I can answer any question for you let me know, I have just finished picking up what your starting.
    I have read many, many tutorials and used tons of commands from user tutorials and if there is one person you can trust to give you the correct information and show you write the first time its XPLOITZ !!! It is critical to be taught the right way first so I personally really appreciate it.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •