Page 1 of 4 123 ... LastLast
Results 1 to 10 of 36

Thread: capture.cap

  1. #1
    Just burned his ISO
    Join Date
    Jul 2007
    Posts
    12

    Default capture.cap

    ok i read the newbie guide to cracking WEP, but when i try to do that very last step it says "cannot find capture.cap" i saw someone say "are you running the command from the place that capture.cap is?" but i dont know how to do that. could someone elaborate on how to run a command from where the file is? it would be much appreciated.

  2. #2
    Member
    Join Date
    Apr 2007
    Posts
    163

    Default

    ... perhaps you should start with the real basics before start cracking wep... may i suppose reading this?
    The answer is 42.

  3. #3
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Look at my video in the tutorials section. Its aimed at completes no0bies like yourself.

    http://forums.remote-exploit.org/showthread.php?t=7633

    The cap file is in your home folder. Go to Konqueror>Home Folder>and you'll see it somewhere in there named whatever-01.cap.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  4. #4
    Developer
    Join Date
    Mar 2007
    Posts
    6,126

    Default

    from the bash prompt you should not have to modify the path for your .cap folder as the /root menu is in the path by default. If I were you I would be sure I was actually CREATING a cap file when i typed the airodump command. I would also check out operators link. If you are having trouble cracking wep with all the documentation here and at aircracks site you nare going to have a super bitch of a time with backtrack. Im not discouraging you from using this great distro but be ready for some head aches

  5. #5
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Expanding on purehates comment...your command line in airodump should look similar to...

    airodump-ng -w xploitz -c 6 --bssid 00:18:F8:B5:F2:C6 ath0

    where -w is the name of your .cap file located where I just told ya to look. -c is the chanel your AP is on. And the --bssid is the BSSID of your AP. My interface is ath0 yours may be different..just replace my info with yours.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  6. #6
    Just burned his ISO
    Join Date
    Jul 2007
    Posts
    12

    Default

    ok so i'd type airodump-ng -w capture -c 6 --bssid XX:XX:XX:XX:XX:XX ra0
    then? instead of just airodump-ng -w capture -c 6 ra0 and then my aircrack-ng -f 4 -m XX:XX:XX:XX:XX:XX -n 64 capture.cap command should work?

  7. #7
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    To be honest..Ive never had to use the fudge factor options (-f) My aircrack-ng command line looks like...

    Code:
     aircrack-ng -n 64 --bssid 00:18:F8:B5:F2:C6 xploitz-01.cap
    where -n 64 means 64 bit encryption .(there is also 128 and 256 bit option) the rest of my commands you should know.


    BTW..I really suggest you name your capture file name to something more unique than just capture.cap. Try to name it something that has to do with the name of the ESSID. It helps me by not confusing what .cap file goes with which one of my networks.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  8. #8
    Just burned his ISO
    Join Date
    Jul 2007
    Posts
    12

    Default

    OH! thats what ive been doing wrong! i kept typing -n 64 when my network is 128-bit. ok, lemme try switching that up too. thanks alot for the help

  9. #9
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    No problem Chaos. Glad I could help. But if my memory serves itself..if you don't use the -n option..it defaults to 128 bit anyways.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  10. #10
    Just burned his ISO
    Join Date
    Jul 2007
    Posts
    12

    Default

    one more thing, how do i find out whether a network is 64 or 128-bit encryption in kismet? all it ever tells me is "WEP? - Yes" but never what kind of WEP.

Page 1 of 4 123 ... LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •