Results 1 to 2 of 2

Thread: [ipw2200] Deauth attack

  1. #1
    Just burned his ISO
    Join Date
    Oct 2007

    Default [ipw2200] Deauth attack

    I've tried a lot of times, and each time I only get, "Sending DeAuth to station -- STMAC: [ (...MAC...) ] so the attack is unsuccessful. Any idea?

    Thanks to all

  2. #2
    Senior Member
    Join Date
    Apr 2007


    Need a LOT more info than that!!

    What is all commands used from boot up to your deauth command??
    How far away are you?

    What card are you using..its chipset...etc.

    I see that message all the time. If your cracking WPA/WPA2 look in your airodumps upper right had corner for the handshake...for WEP...does the station disappear from the airodump screen?

    Deauth almost always works.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [URL=""][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [URL=""][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [URL=""][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL=""][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts