Results 1 to 6 of 6

Thread: Where does BT2.0 store the Airodump capture files?

  1. #1
    virtthemaest
    Guest

    Default Where does BT2.0 store the Airodump capture files?

    Hi,

    Sorry for such simple question. I would just like to know where Backtrack 2.0 stores the capture files for airodump-ng? I've searched for a couple of hours in almost every directory and cannot see the aireplay-ng nor aircrack-ng directories any where!

    My interest came to me as this is the command to create the capture file
    "airodump-ng -w capture -c 6 ath0

    And to load it should be
    aircrack-ng -f 4 -m 00:00:00:00:00:00 -n 64 capture.cap

    Unfortunately for me the system is saying there is no capture.cap

    what am I doing wrong I think the syntax is correct, maybe I'm not saving it correctly, or not loading it correct.
    I could do with some advice any would be much appreciated

    Thanks in advance

  2. #2
    Senior Member PrairieFire's Avatar
    Join Date
    Apr 2007
    Posts
    705

    Default

    Quote Originally Posted by virtthemaest View Post
    Hi,

    Sorry for such simple question. I would just like to know where Backtrack 2.0 stores the capture files for airodump-ng? I've searched for a couple of hours in almost every directory and cannot see the aireplay-ng nor aircrack-ng directories any where!

    My interest came to me as this is the command to create the capture file
    "airodump-ng -w capture -c 6 ath0

    And to load it should be
    aircrack-ng -f 4 -m 00:00:00:00:00:00 -n 64 capture.cap

    Unfortunately for me the system is saying there is no capture.cap

    what am I doing wrong I think the syntax is correct, maybe I'm not saving it correctly, or not loading it correct.
    I could do with some advice any would be much appreciated

    Thanks in advance
    Same directory you started airodump-ng in.

    "capture" is only the partial name, an instance # is added each time you restart it.
    Μολὼν λαβέ - Great spirits encounter heavy opposition from mediocre minds.

  3. #3
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Thumbs up Laymens terms....

    PrairieFire's right.

    But to expand and break it down for ya into even simpler terms....(no offense PrairieFire).....


    your command line...

    Code:
     airodump-ng -w capture -c 6 ath0
    makes a capture file called capture...this is true. Look inside your home folder...and make sure you have show all files and folders checked under the "view" menu bar,.. (I believe...not 100% sure which tab its under..or if its even necessary...but it doesn't hurt to make sure. )

    Now in your home folder you should see a txt file called capture-01..capture-02..etc...depending on how many times you used -w capture as your save file. Its there.

    A good rule of thumb for just starting out is to use the command line...
    Code:
    aircrack-ng -b <APMAC> <capture*.cap>


    What is this * in capture.cap???

    Answer:

    Its called a "wild card"

    With the command

    aircrack-ng -b <APMAC> capture*.cap

    Aircrack will use EVERY capture file (.cap) with the name capture in it and with ONLY that AP's BSSID (remember me putting the -b <APMAC> in the command line??).....so that means all your capture-01.cap...capture-02.cap....capture-03.cap...etc...etc...etc...will all be combined with ONLY THAT AP and used with aircrack-ng.

    Got all that virtthemaest???

    Take a look at my WEP videos in the tutorial section..if you look close at the -3 attack I believe...at the end when I use aircrack-ng command...I use the * wildcard to use my previous captures to save time on my video.

    Any thing else virtthemaest..or does that answer your questions??
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  4. #4
    virtthemaest
    Guest

    Talking

    Thanks you -=Xploitz=-,
    I was use to working with the Win version, which stored the files wherever you unpacked the Aircrack-ng folder too and moved the Peek.dll too. It would always store the capture in this directory by default.

    I was in Win mode looking in /etc /home etc for
    All the files that looked familiar working inWinblows environment.

    I didn’t start Airodump in the Airodump directory, I could start it from /root/Desktop if I wanted too with airodump-ng -w capture -c 6 ath0 Command.

    That really helped I was able to find 3 Capture files with over a 1,000,000 IV's

    Thanks heaps for the help! Everyday my Unix skills and Wifi skill are increasing due to the remote exploit forums! THANKS!!

  5. #5
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by virtthemaest View Post
    Thanks you -=Xploitz=-,
    I was use to working with the Win version, which stored the files wherever you unpacked the Aircrack-ng folder too and moved the Peek.dll too. It would always store the capture in this directory by default.

    I was in Win mode looking in /etc /home etc for
    All the files that looked familiar working inWinblows environment.

    I didn’t start Airodump in the Airodump directory, I could start it from /root/Desktop if I wanted too with airodump-ng -w capture -c 6 ath0 Command.

    That really helped I was able to find 3 Capture files with over a 1,000,000 IV's

    Thanks heaps for the help! Everyday my Unix skills and Wifi skill are increasing due to the remote exploit forums! THANKS!!
    Your quite welcome. If you want a really great no0bie colorful how to use Linux book....my very first book I bought after finding this site was called

    Linux in easy steps. 240 something pages.








    It totally helped me out lots!! And it broke EVERYTHING down just like I did to you....super E-Z!!! And colorful!! I highly recommend it for all no0bies to Linux.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  6. #6
    virtthemaest
    Guest

    Default

    I have it :P

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •