Closed GoogleCodeExporter closed 9 years ago
Yeah, i have similar problem, but with mon0 interface.
Original comment by zdevel
on 18 Jun 2009 at 11:31
And yes, injection is rausb0, and monitor is rausb0 too.
Original comment by zdevel
on 18 Jun 2009 at 11:36
If it's a non-builtin driver, then I guess wepbuster will not have trouble
detecting
it. Read the Troubleshooting page. I wouldn't really consider the mac address as
weird. The reason why it looks like that is because the card is not in managed
mode
when you did an 'ifconfig'. But wepbuster can take care of this already. Make
sure
you're using the latest version.
Original comment by markjays...@gmail.com
on 18 Jun 2009 at 11:40
Original comment by markjays...@gmail.com
on 18 Jun 2009 at 11:59
i m using the 0.4 but just to make sure i downloaded and run it again...
same... than i unloaded driver:
modprobe -r rt73 and loaded again: modprobe rt73 now it says:
..................Cannot open airodump output.: No such File or Directory
Original comment by 4brother...@googlemail.com
on 18 Jun 2009 at 12:11
[deleted comment]
[deleted comment]
Wiki -> Troubleshooting
Original comment by lem0ngr...@fastmail.fm
on 18 Jun 2009 at 12:27
i m sry to post new problems here, but i cant get it running
"ps ax |grep perl && ps ax |grep air" output:
steffen@steffen-pc:~$ sudo ps ax |grep perl && ps ax |grep air
6948 pts/0 S+ 0:00 perl wepbuster
7004 pts/0 S+ 0:00 perl wepbuster
7021 pts/1 S+ 0:00 grep perl
7005 pts/0 S+ 0:00 airodump-ng rausb0 -t wep -c 7 -n -w chan7
7023 pts/1 S+ 0:00 grep air
steffen@steffen-pc:~$ sudo ps ax |grep perl && ps ax |grep air
6948 pts/0 S+ 0:00 perl wepbuster
7027 pts/0 S+ 0:00 perl wepbuster
7042 pts/1 S+ 0:00 grep perl
7028 pts/0 S+ 0:00 airodump-ng rausb0 -t wep -c 9 -n -w chan9
7044 pts/1 S+ 0:00 grep air
steffen@steffen-pc:~$ sudo ps ax |grep perl && ps ax |grep air
6948 pts/0 S+ 0:00 perl wepbuster
7081 pts/0 S+ 0:00 perl wepbuster
7095 pts/1 S+ 0:00 grep perl
7082 pts/0 S+ 0:00 airodump-ng rausb0 -t wep -c 4 -n -w chan4
7097 pts/1 R+ 0:00 grep air
I also realized that the link led on my usb device doesnt idicate much
activity...
when i do it manualy it blinks fast when I use wepbuster it blinks in slow in
constant periods.
any ideas?
thank you
Original comment by Steffen....@gmail.com
on 19 Jun 2009 at 1:24
i did also this know:
########## INTERFACE CONFIGURATION ##################
# Injection interface to use (ath0, wlan0, rausb0)
my $inject_iface = 'rausb0';
# Monitor interface to use (e.g, rtap0, mon0)
my $monitor_iface = 'rausb0';
# Mac Address of your injecting interface
my $macaddress = '00:16:01:9a:10:60';
wepbuster Folder is r/w and all files in it too.
And I have a question to the precompiled files. Where do i have to copy this...
I
have these files in Documents. when i ran aircrack-ng the first time it
installed it
and then I made it starting every start of ubuntu... now i can access it from
everywhere so it shouldnt matter where the files are? right? or do i have to
capy it
some where specific?
Original comment by Steffen....@gmail.com
on 19 Jun 2009 at 1:33
sudo airodump-ng rausb0 -t wep ......returnes:
CH 10 ][ Elapsed: 20 mins ][ 2009-06-18 19:05
BSSID PWR Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID
00:1D:73:6B:FC:27 110 647 0 0 1 54e. WEP WEP
357806317316B3C34115B62A3F7BDAA3
06:1B:8B:AF:55:43 104 168 0 0 4 54e. WEP WEP
WARPSTAR-4B14B5-W
00:60:1D:23:EE:3C 104 522 7 0 11 11 WEP WEP
78040DSHIMADA
00:1D:73:0F:50:1F 103 322 4 0 2 54e WEP WEP
12BA65655D57E1F8251C13FC4159D9CD
00:07:40:4D:6E:3C 103 173 1 0 11 54 WEP WEP
SHIMADA_AirStationG54-2
00:0D:0B:6E:4E:5F 102 32 0 0 11 54 WEP WEP
SHIMADA_AirStationG54-1
00:16:01:FA:8B:BB 102 54 0 0 6 54e WEP WEP buffalo
BSSID STATION PWR Rate Lost Packets Probes
(not associated) 00:13:CE:34:C6:31 114 0 - 1 0 16 000D0B7046BE_A
^C
I could also dump files with airodump-ng ...
Cant find any reason why wepbuster is not working please help me.
Original comment by Steffen....@gmail.com
on 19 Jun 2009 at 2:08
[deleted comment]
i hope posted all usefull informations now and thanks in advance to help me out
here
steffen@steffen-pc:~/Documents/tarball_staging$ sudo airodump-ng rausb0 -t wep
CH 10 ][ Elapsed: 1 min ][ 2009-06-18 20:56
BSSID PWR Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID
00:1D:73:6B:FC:27 113 72 0 0 1 54e. WEP WEP 35780
00:1D:73:0F:50:1F 110 30 0 0 10 54e WEP WEP 12BA6
06:1B:8B:AF:55:43 107 9 0 0 4 54e. WEP WEP WARPS
00:60:1D:23:EE:3C 107 18 0 0 11 11 WEP WEP 78040
00:07:40:4D:6E:3C 105 23 0 0 11 54 WEP WEP SHIMAB
00:16:01:FA:8B:BB 104 16 0 0 5 54e WEP WEP buffaB
00:0D:0B:6E:4E:5F 103 5 0 0 11 54 WEP WEP SHIMAB
B
BSSID STATION PWR Rate Lost Packets Probes B
B
(not associated) 00:23:12:57:E3:CA 58 0 - 1 0 10 000D0B7046B
^C
steffen@steffen-pc:~/Documents/tarball_staging$ sudo perl wepbuster
=========================================================
No valid channel entered. Using the default ( US = 1 2 3 4 5 6 7 8 9 10 11 )
MODE: crack (using: rausb0/rausb0 == 00:16:01:9a:10:60)
Scanning channel 6 for WEP-enabled Access Points
..........
Found 0 AP(s) on channel 6
Scanning channel 11 for WEP-enabled Access Points
..........
Found 0 AP(s) on channel 11
Scanning channel 3 for WEP-enabled Access Points
..........
Found 0 AP(s) on channel 3
Scanning channel 7 for WEP-enabled Access Points
..........
Found 0 AP(s) on channel 7
Scanning channel 9 for WEP-enabled Access Points
..........
Found 0 AP(s) on channel 9
Scanning channel 2 for WEP-enabled Access Points
..........
Found 0 AP(s) on channel 2
Scanning channel 8 for WEP-enabled Access Points
..........
Found 0 AP(s) on channel 8
Scanning channel 4 for WEP-enabled Access Points
..........
Found 0 AP(s) on channel 4
Scanning channel 1 for WEP-enabled Access Points
..........
Found 0 AP(s) on channel 1
Scanning channel 10 for WEP-enabled Access Points
..........
Found 0 AP(s) on channel 10
Scanning channel 5 for WEP-enabled Access Points
..........
Found 0 AP(s) on channel 5
Found no AP. Exiting...
steffen@steffen-pc:~/Documents/tarball_staging$
Original comment by Steffen....@gmail.com
on 19 Jun 2009 at 4:02
I tried another thing:
steffen@steffen-pc:~$ sudo ps ax |grep perl && ps ax |grep air
[sudo] password for steffen:
5781 pts/0 S+ 0:00 perl wepbuster
5844 pts/0 S+ 0:00 perl wepbuster
5877 pts/1 S+ 0:00 grep perl
5845 pts/0 S+ 0:00 airodump-ng rausb0 -t wep -c 9 -n -w chan9
5879 pts/1 R+ 0:00 grep air
steffen@steffen-pc:~$ sudo airodump-ng rausb0 -t wep -c 1 -n -w chan1
CH 1 ][ Elapsed: 20 s ][ 2009-06-18 21:06
BSSID PWR RXQ Beacons #Data, #/s CH MB ENC CIPHER AUTH E
00:1D:73:6B:FC:27 114 32 211 0 0 1 54e. WEP WEP 3
BSSID STATION PWR Rate Lost Packets Probes
(not associated) 00:13:CE:34:C6:31 113 0 - 1 0 2 000D0B7046B
(not associated) 00:23:12:57:E3:CA 60 0 - 1 0 1 000D0B7046B
^C
steffen@steffen-pc:~$ airodump-ng rausb0 -t wep -c 1 -n -w chan1
socket(PF_PACKET) failed: Operation not permitted
This program requires root privileges.
maybe the programm it self cant execute the airmon-ng command as root... thats
why i
cant capture something... what do you think about that?
Original comment by Steffen....@gmail.com
on 19 Jun 2009 at 4:10
another thing:
locate airodump-ng.c --- no results
does that mean i have to download aircrack-ng first and then copy your
precompiled
files into the folder??
Original comment by Steffen....@gmail.com
on 19 Jun 2009 at 5:23
Original issue reported on code.google.com by
Steffen....@gmail.com
on 18 Jun 2009 at 11:29