Author Topic: Backtrack Wifi Cracking Problem  (Read 6299 times)

0 Members and 1 Guest are viewing this topic.

Offline sanju4883

  • Serf
  • *
  • Posts: 20
  • Cookies: -1
  • If you can't Beat it, Just Cheat it (Sanjit Patel)
    • View Profile
    • Computer Hacking Tricks and Tips
Backtrack Wifi Cracking Problem
« on: May 26, 2012, 06:20:24 pm »
While Cracking WPA or WPA2 password of wifi on backtrack, then  WPA Handshake could not be done or establish.. any Help please... !!!

I have also getting problem og <Hidden> Essid... help me please..
« Last Edit: May 26, 2012, 07:15:21 pm by Kulverstukas »

Offline palipr

  • /dev/null
  • *
  • Posts: 6
  • Cookies: 0
    • View Profile
Re: Backtrack Wifi Cracking Problem
« Reply #1 on: May 26, 2012, 08:12:31 pm »

Make sure you set the channel on the monitor interface. If not the channel hopping can cause you to lose parts of the handshake.


Make sure airodump-ng is capturing all packets not just ivs


To find a hidden ssid deauth a client associated with the AP. Not sure how to discover without an associated client.


edit: what are you using to crack the handshake?
« Last Edit: May 26, 2012, 08:13:29 pm by palipr »

Offline sanju4883

  • Serf
  • *
  • Posts: 20
  • Cookies: -1
  • If you can't Beat it, Just Cheat it (Sanjit Patel)
    • View Profile
    • Computer Hacking Tricks and Tips
Re: Backtrack Wifi Cracking Problem
« Reply #2 on: May 27, 2012, 05:51:36 am »
Make sure you set the channel on the monitor interface. If not the channel hopping can cause you to lose parts of the handshake.


Make sure airodump-ng is capturing all packets not just ivs


To find a hidden ssid deauth a client associated with the AP. Not sure how to discover without an associated client.


edit: what are you using to crack the handshake?


------------------


The following command i am using to crack WPA...
(((TB = target BSSID, TC = Target channel, CM = station))))



airmon-ng
airmon-ng start wlan0
airodump-ng mon0
airodump-ng -w wep --bssid TB -c TC mon0
aireplay-ng --deauth 1 -a TB -c CM mon0


etc.......

Offline techb

  • Soy Sauce Feeler
  • Global Moderator
  • King
  • *
  • Posts: 2350
  • Cookies: 345
  • Aliens do in fact wear hats.
    • View Profile
    • github
Re: Backtrack Wifi Cracking Problem
« Reply #3 on: May 27, 2012, 06:16:42 am »
Shouldn't mon0 be the wlan0?
>>>import this
-----------------------------

Offline palipr

  • /dev/null
  • *
  • Posts: 6
  • Cookies: 0
    • View Profile
Re: Backtrack Wifi Cracking Problem
« Reply #4 on: May 27, 2012, 06:46:19 am »

------------------


The following command i am using to crack WPA...
(((TB = target BSSID, TC = Target channel, CM = station))))



airmon-ng
airmon-ng start wlan0
airodump-ng mon0
airodump-ng -w wep --bssid TB -c TC mon0
aireplay-ng --deauth 1 -a TB -c CM mon0


etc.......


I would use 'airmon-ng start wlan0 TC'
I don't think that setting the channel in airodump-ng will keep the interface from channel hopping
Does airodump-ng confirm that it has detected a WPA handshake? I ask because for me airodump-ng would say that everything was captured correctly. But when attempting to crack pyrit was coming back saying that the capture file did not include a complete handshake. Drove me crazy until I found a patch for it. To make sure everything was working correctly I used a spare laptop to manually connect to my own WAP to ensure I had a valid handshake, once I made that work I moved on.

Offline sanju4883

  • Serf
  • *
  • Posts: 20
  • Cookies: -1
  • If you can't Beat it, Just Cheat it (Sanjit Patel)
    • View Profile
    • Computer Hacking Tricks and Tips
Re: Backtrack Wifi Cracking Problem
« Reply #5 on: May 28, 2012, 04:49:01 am »

I would use 'airmon-ng start wlan0 TC'
I don't think that setting the channel in airodump-ng will keep the interface from channel hopping
Does airodump-ng confirm that it has detected a WPA handshake? I ask because for me airodump-ng would say that everything was captured correctly. But when attempting to crack pyrit was coming back saying that the capture file did not include a complete handshake. Drove me crazy until I found a patch for it. To make sure everything was working correctly I used a spare laptop to manually connect to my own WAP to ensure I had a valid handshake, once I made that work I moved on.


================================
thanks dude.. i am getting little bit you.. can u share terminal CODE here..  means by TC.. should i get type the Target channel.. so i think i have to first scan it.....???

Offline sanju4883

  • Serf
  • *
  • Posts: 20
  • Cookies: -1
  • If you can't Beat it, Just Cheat it (Sanjit Patel)
    • View Profile
    • Computer Hacking Tricks and Tips
Re: Backtrack Wifi Cracking Problem
« Reply #6 on: May 28, 2012, 04:50:37 am »
Shouldn't mon0 be the wlan0?


means i  turn my wlan0 into monitor mode.. and this same is happen in Gerix wifi cracking tools in Backtrack 5

Offline palipr

  • /dev/null
  • *
  • Posts: 6
  • Cookies: 0
    • View Profile
Re: Backtrack Wifi Cracking Problem
« Reply #7 on: June 05, 2012, 04:14:53 am »

================================
thanks dude.. i am getting little bit you.. can u share terminal CODE here..  means by TC.. should i get type the Target channel.. so i think i have to first scan it..... ???


I've been really busy for a bit, you still interested in the term session? I don't have it saved or anything like that but I will do it again if you want

Offline sanju4883

  • Serf
  • *
  • Posts: 20
  • Cookies: -1
  • If you can't Beat it, Just Cheat it (Sanjit Patel)
    • View Profile
    • Computer Hacking Tricks and Tips
Re: Backtrack Wifi Cracking Problem
« Reply #8 on: June 08, 2012, 04:59:05 am »

I've been really busy for a bit, you still interested in the term session? I don't have it saved or anything like that but I will do it again if you want


ok thanks..

Offline sanju4883

  • Serf
  • *
  • Posts: 20
  • Cookies: -1
  • If you can't Beat it, Just Cheat it (Sanjit Patel)
    • View Profile
    • Computer Hacking Tricks and Tips
Re: Backtrack Wifi Cracking Problem
« Reply #9 on: June 08, 2012, 05:00:26 am »

I would use 'airmon-ng start wlan0 TC'
I don't think that setting the channel in airodump-ng will keep the interface from channel hopping
Does airodump-ng confirm that it has detected a WPA handshake? I ask because for me airodump-ng would say that everything was captured correctly. But when attempting to crack pyrit was coming back saying that the capture file did not include a complete handshake. Drove me crazy until I found a patch for it. To make sure everything was working correctly I used a spare laptop to manually connect to my own WAP to ensure I had a valid handshake, once I made that work I moved on.


SO on which TC (Channel) i should set mon0, only the target channel or any other else?

Offline h4ppy_4rtist

  • Serf
  • *
  • Posts: 35
  • Cookies: 0
    • View Profile
Re: Backtrack Wifi Cracking Problem
« Reply #10 on: June 13, 2012, 06:35:30 pm »
I would suggest for capturing only the target channel because you want just the packets on that channel by victim AP and of course the clients who wants to connect to the AP.
« Last Edit: June 13, 2012, 06:37:50 pm by h4ppy_4rtist »
[[ We're all some kind of artists. ]]