Results 1 to 9 of 9

Thread: wireless mac address and dic attack

Hybrid View

  1. #1
    Just burned his ISO
    Join Date
    Jun 2011
    Posts
    9

    Default wireless mac address and dic attack

    Hi,

    Im new to linux and backtrack but have managed to crack my wifi network when set to 64 and 128 bit wep but have a couple of questions im hoping someone can answer.

    1:-Mac changer

    Is the mac changer used only to spoof a clients mac address or is it changed anyways for security?

    2:- arp requests

    a couple of times when getting arp requests i get lots each time but usually i only get 1 at a time so my data goes up slowly, is there a way to increase the amount of arps i get?



    Another problem i am facing though is dictionary attacks on my psk network.

    i use:- aireplay-ng -0 -5 -a (bssid) (wcard)

    aircrack-ng -w (dictionary) (cap file)

    and the scan seems to be going fine but the end result is it does not find my key even though its in the password list. (is there a way to speed up the scan)



    sorry if bits dont seem to make sense, jumping to linux form windows is like starting again =p

    Forgot to add im using alfa awuso36h

  2. #2
    Member
    Join Date
    May 2011
    Location
    Israel
    Posts
    74

    Default Re: wireless mac address and dic attack

    a couple of times when getting arp requests i get lots each time but usually i only get 1 at a time so my data goes up slowly, is there a way to increase the amount of arps i get?
    ping unavailable host
    Is the mac changer used only to spoof a clients mac address or is it changed anyways for security?
    it is used also to hide your network interface identity
    Scientia ac Labore

  3. #3
    Just burned his ISO
    Join Date
    Jun 2011
    Posts
    9

    Default Re: wireless mac address and dic attack

    sorry for stupid questions but by pinging unavailible host do you mean this?

    aireplay-ng -3 -b 00:13:10:30:24:9C -h 00:11:22:33:44:55 -r replay_arp-0219-115508.cap ath0

    and

    aireplay-ng -2 -r replay_arp-0219-115508.cap ath0

    or have i gone of track?

  4. #4
    Just burned his ISO
    Join Date
    Jun 2011
    Posts
    9

    Default Re: wireless mac address and dic attack

    ive googled everywhere but cant seem to find how to ping the unavailible host as all i have is a mac address.



    the problem i get sometimes is

    sent xxxxx packets (got 1 arp request and xxxx acks)

    I need to be getting a higher amount of the arps but sometimes i just get 1.

  5. #5
    Member
    Join Date
    May 2011
    Location
    Israel
    Posts
    74

    Default Re: wireless mac address and dic attack

    use windows ping command
    Scientia ac Labore

  6. #6
    Just burned his ISO
    Join Date
    Jun 2011
    Posts
    9

    Default Re: wireless mac address and dic attack

    Thanks for help. I found another method that works very well though. Enough that im happy to move on from wep now

  7. #7
    Just burned his ISO
    Join Date
    Jun 2011
    Posts
    2

    Default Re: wireless mac address and dic attack

    Quote Originally Posted by rocksteady View Post
    Thanks for help. I found another method that works very well though. Enough that im happy to move on from wep now
    can u tell me what the other method?thanks

  8. #8
    Junior Member
    Join Date
    Aug 2007
    Location
    Aussie
    Posts
    25

    Default Re: wireless mac address and dic attack

    you only need one arp which is captured by aireplay-ng and replayed to the network where it is broadcast each time it is sent which generates a new IV with each broadcast. You need to match the MAC adress of the card connected to the AP thus MACCANGER can be used to spoof the MAC or the AP may reject the ARP and thus not generate IV's. a no client attack with fakeauth and packet forge can be quicker and easier even if there are connected clients.

  9. #9
    Member shadowzero's Avatar
    Join Date
    Jun 2011
    Location
    ${HOME}
    Posts
    94

    Default Re: wireless mac address and dic attack

    Quote Originally Posted by rocksteady View Post
    aircrack-ng -w (dictionary) (cap file)

    and the scan seems to be going fine but the end result is it does not find my key even though its in the password list. (is there a way to speed up the scan)
    Yes, create a smaller wordlist with your password in there. Something with a few lines should do it.

Similar Threads

  1. [Metasploit]The address is already in use (WAN attack)
    By illera88 in forum Beginners Forum
    Replies: 8
    Last Post: 12-31-2010, 04:54 AM
  2. dos attack in wireless
    By kieuanh in forum OLD Newbie Area
    Replies: 7
    Last Post: 01-01-2010, 05:48 AM
  3. Difficults with faking mac address on wireless.
    By n0PxN0p in forum OLD Newbie Area
    Replies: 0
    Last Post: 09-25-2009, 06:59 PM
  4. Replies: 1
    Last Post: 12-16-2008, 02:07 PM
  5. how to overcome wireless mac address filter.
    By tiong in forum OLD Wireless
    Replies: 9
    Last Post: 08-28-2008, 08:24 AM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •