Results 1 to 3 of 3

Thread: Strange WEP auth

  1. #1
    Just burned his ISO
    Join Date
    Nov 2007
    Posts
    3

    Default Strange WEP auth

    Good day everybody,

    I am trying to crack a wifi network at my place. I passed by the MAC filtering by changing my MAC to one authorized by the AP. I have injected packets and captured enough packets (roughly 4 millions). When I run aircrack-ng, it finds a WEP key.

    Altough when I try to connect with an authorized MAC, it doesn't work because it says the network has PSK auth.

    I tought PSK was only for WPA although this is not WPA because I found a WEP key.

    How can I connect to this network considering I have the WEP key and an authorised MAC although it has PSK auth ?

    Thanks in advance,

    Antoine

  2. #2
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Quote Originally Posted by tekzone View Post
    Good day everybody,

    I am trying to crack a wifi network at my place. I passed by the MAC filtering by changing my MAC to one authorized by the AP. I have injected packets and captured enough packets (roughly 4 millions). When I run aircrack-ng, it finds a WEP key.

    Altough when I try to connect with an authorized MAC, it doesn't work because it says the network has PSK auth.

    I tought PSK was only for WPA although this is not WPA because I found a WEP key.

    How can I connect to this network considering I have the WEP key and an authorised MAC although it has PSK auth ?

    Thanks in advance,

    Antoine
    Seeing as this is your network, shouldn't you know the configuration of your AP?
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  3. #3
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Thread closed..duplicate.

    DON'T DOUBLE POST!!

    As you posted this same question here but with a different title...



    Code:
    http://forums.remote-exploit.org/showthread.php?p=52431#post52431
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •