While trying to learn about wireless security, I made a airodump-ng ath0 and here's my output :
BSSID PWR RXQ Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID
00:00:C5:C4:8E:39 20 13 238 596 0 6 11 WEP WEP 61107375
00:14:7F:CD:BB:47 18 100 1560 35 0 6 48 WEP WEP portablebernardw
00:13:F7:31:0D:91 18 100 2213 14 0 6 54. WEP WEP SMC
I'm testing ESSID SMC ( as finding the WEP for the first 2 networks went like a breeze ) but when I go through authentication, here's the output :
23:33:11 Waiting for beacon frame (BSSID: 00:13:F7:31:0D:91)
23:33:12 Sending Authentication Request (Open System)
23:33:14 Sending Authentication Request (Open System)
etc etc ...
until it writes :
Attack was unsuccessful.
I have a power of 18 ( PWR column ) , could it be that the signal is too weak ?
Strangely, in the shell window showing the airodump, it shows that I'm linked to the network for around 1 minute ... what could be the reason ?
How would you try to authenticate ? What kind of attack would you try to perform ? ( if it's not a problem of a weak signal ? )
[CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
[CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
[URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
[URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
[URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]
[URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
Well, I finally managed to have it worked.
Strangely, it seems like I can authenticate myself successfully the first time, but then, if I take too much time before launching an attack, it gives the messages described before.
Is it a known behaviour from an AP ? Do you think a tutorial could be made on all the various ways to get authenticated with an AP ? ( so even before launching any attacks )