Results 1 to 2 of 2

Thread: Aireplay "Interactive packet replay" does not work for me.

Hybrid View

  1. #1
    Just burned his ISO
    Join Date
    Apr 2007

    Default Aireplay "Interactive packet replay" does not work for me.

    Hi, I'm using BT2 with upgraded aircrack suit (ver 0.9.3)

    I have an atheros chipset and I successfuly started it in monitor mode with
    airmon-ng stop ath0
    airmon-ng start wifi0 3
    I have tried "Interactive packet replay"
    with the command:
    aireplay-ng -2 -b <AP MAC> -d FF:FF:FF:FF:FF:FF -t 1 ath0
    I have checked the injected packets with a true wifi sniffer.
    they seemed to be fine.

    the destination MAC was FF:FF:FF:FF:FF:FF
    and the source MAC was the same MAC of the associated client.
    and my REAL MAC was not mentioned in the injected packets.

    so , everything seems to be OK, since in this kind of attack I don't need to associate my REAL MAC, right?

    but I didn't succeed to increase the IVs.

    so, whats going on here?
    why the AP does not respond to those injected packets?

    mybe some security settings in the AP ?
    as I know , I configured the AP without additional securtiy settings.. but since I'm newbie , whos knows..

  2. #2


    I'm not sure you are using this attack in the correct way. What are you trying to accomplish?

    You have set the TO DS bit to 1, which if I'm not mistaken, would infer that the FROM DS bit would be a 0, which means the packet is being sent from a client to the AP.

    Your destination MAC address is broadcast, so the TO DS setting and your Destination are conflicting in this case.

    You are using the interactive replay attack, but you do not mention what packet you are using for your replay. There are certain types of packets that only normally come from an AP, such as Deauth. So make sure the packet you are using for replay is correct.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts