bktruss / fern-wifi-cracker

Automatically exported from code.google.com/p/fern-wifi-cracker
0 stars 0 forks source link

defaults to passive mode #32

Open GoogleCodeExporter opened 9 years ago

GoogleCodeExporter commented 9 years ago
What steps will reproduce the problem?
1. scan for wifi network
2. select wep network, arp replay attack and select maximum number of IVs
3. run attack

What is the expected output? What do you see instead?
the expected output would be that it would listen for arp packets and reinject 
them into the target network to get IVs to crack wep but instead fern says 
passive mode was activated and it just listens for IVs and does not inject any 
packets

What version of the product are you using? On what operating system?
the most recent it is duplicable on the debian package in the backtrack repo 
and a updated version from this google code page  

Please provide any additional information below.
this is a serious fault in fern wifi cracker that should be addressed 

Original issue reported on code.google.com by jinwal...@gmail.com on 18 Aug 2012 at 1:42

GoogleCodeExporter commented 9 years ago
The reason why Fern prefered to listen in passive mode instead of injecting was 
either because you were too far from the access point so that injection was 
impossible or the target access point had mac filtering enabled. Arp replays 
and other injections are only possible after a fake authentication. 

Original comment by saviob...@rocketmail.com on 19 Aug 2012 at 7:27