Results 1 to 5 of 5

Thread: FakeAuth

  1. #1
    Member
    Join Date
    Mar 2007
    Posts
    204

    Default FakeAuth

    I'm using Alfa USB with Realtek 8187 rivers included in BT2 also using Madwifi drivers for Atheros based card. Also using Aircrack-ng 1.0 dev r735

    I get this message with both cards when attempting to fakeauth with my AP

    Ok, I've researched this already and would just like to clarify:

    That when doing a Fakeauth it displays the work [ACK] twice while fakeauth'ing like this:

    10:11:02 Sending Authentication Request [ACK]
    10:11:02 Authentication successful
    10:11:02 Sending Association Request [ACK]
    10:11:02 Association successful :-)

    Am I right in saying this means:

    ACK - acknowledge when a transmission has completed

    So other than this,ACK means nothing!? Its not something I am doing wrong and its supposed to display that?

    This is not a question as such, just more of a confirmation.

    My attack is successfull, and was able to crack my AP fast, (sub 5 mins for 128 and less than 2 mins for 64)

    Thanks in Advance

  2. #2
    Very good friend of the forum drgr33n's Avatar
    Join Date
    Jan 2010
    Location
    Dark side of the moon ...
    Posts
    699

    Default

    LOL peoples questions get madder and madder merlin051you are a nutter

  3. #3
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by merlin051 View Post
    10:11:02 Sending Authentication Request [ACK]
    10:11:02 Authentication successful
    10:11:02 Sending Association Request [ACK]
    10:11:02 Association successful :-)

    Am I right in saying this means:

    ACK - acknowledge when a transmission has completed

    So other than this,ACK means nothing!? Its not something I am doing wrong and its supposed to display that?

    It just means acknowledgment packet. Yes its suppose to say that. Yes your doing it right.

    Just some flashy stuff they included in the update to confirm your doing it right...nothing more.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  4. #4
    Member
    Join Date
    Mar 2007
    Posts
    204

    Default

    Well I'm new here and atleast i researched it first haha

    And i was right :P i just dont remember auditor or BT1 doing it thats all

    thanks for a speedy response.

  5. #5
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by merlin051 View Post
    Well I'm new here and atleast i researched it first haha

    And i was right :P i just dont remember auditor or BT1 doing it thats all

    thanks for a speedy response.
    Yep. At least you searched. Thats why I opted to help you. We all need a little help once in a while.

    And its not auditor bt1 or bt2 that does the ACK thing..its happening because you updated your aircrack-ng suite on BT2.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •