google-code-export / wepbuster

Automatically exported from code.google.com/p/wepbuster
2 stars 4 forks source link

strange mac address #18

Closed GoogleCodeExporter closed 9 years ago

GoogleCodeExporter commented 9 years ago
As you can see some weird things happened with my mac address, any
suggestions how i can get a decent mac address?

sry for my english I m a lost german in Japan...

While freshly rebooted and making sure the drivers are loaded properly and
no aircrack-ng or wepbuster perl process is running (e.g, pkill -9 air &&
pkill -9 perl)

1. What did you see when you ran wepbuster?

0 APs found

2. What do you see when you run "ifconfig"?

rausb0    Link encap:UNSPEC  HWaddr
00-16-01-9A-10-60-00-00-00-00-00-00-00-00-00-00  
          UP BROADCAST NOTRAILERS RUNNING PROMISC ALLMULTI  MTU:1500  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000 
          RX bytes:308137 (308.1 KB)  TX bytes:3148 (3.1 KB)

3. What do you see when you run "iwconfig"?

rausb0    RT73 WLAN  ESSID:""  
          Mode:Monitor  Frequency=2.462 GHz  Bit Rate=54 Mb/s   
          RTS thr:off   Fragment thr:off
          Encryption key:off
          Link Quality=0/100  Signal level:-121 dBm  Noise level:-127 dBm
          Rx invalid nwid:0  Rx invalid crypt:0  Rx invalid frag:0
          Tx excessive retries:0  Invalid misc:0   Missed beacon:0

4. What do you see when you run "airmon-ng"?

Interface   Chipset     Driver

rausb0      Ralink 2573 USB rt73

5. Which Linux are you using?

Ubuntu 9.04

6. Which wireless card/s are you using?
  1. Chipset rt73
  2. Driver (built-in or no?) no - rt73-k2wrlz-3.0.3 (p_larbig)

7. Which interfaces are you supposed to be using or expecting wepbuster to
find?
1. as an injection interface
2. as monitor interface

8.  Which revision of wepbuster in SVN are you using? (normally, the
tarball is updated
everytime a change is commited, to be safe, always checkout the latest
revision
via svn)

---> just downloaded yesterday

9. Did you change and recompile the aircrack-ng sources?

I used the precompiled ones

10. What do you see when you do a "ps ax |grep perl && ps ax |grep air"
while
running the program?

didnt try jet

11. Did you try setting these three manually?
1. $inject_iface
2. $monitor_iface
3. $mac_address

would like to know what i have to type in there

12. Did you read the "Troubleshooting" in the wiki???

yes

13. Did you read it carefully?

yes

14. Did you understand it? =)

yes, I guess

15. Did you try running "airodump-ng -t WEP -n..." using $monitor_iface and
you are certain that you are seeing WEP-enabled access points and not some
odd shaped object that looks like a nuclear silo?

yes worked

16. Did you run into some hot chick lately?

only samon for me please.

Original issue reported on code.google.com by Steffen....@gmail.com on 18 Jun 2009 at 11:29

GoogleCodeExporter commented 9 years ago
Yeah, i have similar problem, but with mon0 interface.

Original comment by zdevel on 18 Jun 2009 at 11:31

GoogleCodeExporter commented 9 years ago
And yes, injection is rausb0, and monitor is rausb0 too.

Original comment by zdevel on 18 Jun 2009 at 11:36

GoogleCodeExporter commented 9 years ago
If it's a non-builtin driver, then I guess wepbuster will not have trouble 
detecting
it. Read the Troubleshooting page. I wouldn't really consider the mac address as
weird. The reason why it looks like that is because the card is not in managed 
mode
when you did an 'ifconfig'. But wepbuster can take care of this already. Make 
sure
you're using the latest version.

Original comment by markjays...@gmail.com on 18 Jun 2009 at 11:40

GoogleCodeExporter commented 9 years ago

Original comment by markjays...@gmail.com on 18 Jun 2009 at 11:59

GoogleCodeExporter commented 9 years ago
i m using the 0.4 but just to make sure i downloaded and run it again... 
same... than i unloaded driver: 
modprobe -r rt73 and loaded again: modprobe rt73 now it says:

..................Cannot open airodump output.: No such File or Directory

Original comment by 4brother...@googlemail.com on 18 Jun 2009 at 12:11

GoogleCodeExporter commented 9 years ago
[deleted comment]
GoogleCodeExporter commented 9 years ago
[deleted comment]
GoogleCodeExporter commented 9 years ago
Wiki -> Troubleshooting

Original comment by lem0ngr...@fastmail.fm on 18 Jun 2009 at 12:27

GoogleCodeExporter commented 9 years ago
i m sry to post new problems here, but i cant get it running

"ps ax |grep perl && ps ax |grep air" output:

steffen@steffen-pc:~$ sudo ps ax |grep perl && ps ax |grep air
 6948 pts/0    S+     0:00 perl wepbuster
 7004 pts/0    S+     0:00 perl wepbuster
 7021 pts/1    S+     0:00 grep perl
 7005 pts/0    S+     0:00 airodump-ng rausb0 -t wep -c 7 -n -w chan7
 7023 pts/1    S+     0:00 grep air
steffen@steffen-pc:~$ sudo ps ax |grep perl && ps ax |grep air
 6948 pts/0    S+     0:00 perl wepbuster
 7027 pts/0    S+     0:00 perl wepbuster
 7042 pts/1    S+     0:00 grep perl
 7028 pts/0    S+     0:00 airodump-ng rausb0 -t wep -c 9 -n -w chan9
 7044 pts/1    S+     0:00 grep air
steffen@steffen-pc:~$ sudo ps ax |grep perl && ps ax |grep air
 6948 pts/0    S+     0:00 perl wepbuster
 7081 pts/0    S+     0:00 perl wepbuster
 7095 pts/1    S+     0:00 grep perl
 7082 pts/0    S+     0:00 airodump-ng rausb0 -t wep -c 4 -n -w chan4
 7097 pts/1    R+     0:00 grep air

I also realized that the link led on my usb device doesnt idicate much 
activity...
when i do it manualy it blinks fast when I use wepbuster it blinks in slow in
constant periods.

any ideas?

thank you

Original comment by Steffen....@gmail.com on 19 Jun 2009 at 1:24

GoogleCodeExporter commented 9 years ago
i did also this know:

##########   INTERFACE CONFIGURATION   ##################

# Injection interface to use (ath0, wlan0, rausb0)
my $inject_iface = 'rausb0';

# Monitor interface to use (e.g, rtap0, mon0)
my $monitor_iface = 'rausb0';

# Mac Address of your injecting interface
my $macaddress = '00:16:01:9a:10:60';

wepbuster Folder is r/w and all files in it too.

And I have a question to the precompiled files. Where do i have to copy this... 
I
have these files in Documents. when i ran aircrack-ng the first time it 
installed it
and then I made it starting every start of ubuntu... now i can access it from
everywhere so it shouldnt matter where the files are? right? or do i have to 
capy it
some where specific?

Original comment by Steffen....@gmail.com on 19 Jun 2009 at 1:33

GoogleCodeExporter commented 9 years ago
sudo airodump-ng rausb0 -t wep   ......returnes:

CH 10 ][ Elapsed: 20 mins ][ 2009-06-18 19:05                                   

 BSSID              PWR  Beacons    #Data, #/s  CH  MB   ENC  CIPHER AUTH ESSID     

 00:1D:73:6B:FC:27  110      647        0    0   1  54e. WEP  WEP        
357806317316B3C34115B62A3F7BDAA3    
 06:1B:8B:AF:55:43  104      168        0    0   4  54e. WEP  WEP        
WARPSTAR-4B14B5-W                   
 00:60:1D:23:EE:3C  104      522        7    0  11  11   WEP  WEP        
78040DSHIMADA                       
 00:1D:73:0F:50:1F  103      322        4    0   2  54e  WEP  WEP        
12BA65655D57E1F8251C13FC4159D9CD    
 00:07:40:4D:6E:3C  103      173        1    0  11  54   WEP  WEP        
SHIMADA_AirStationG54-2             
 00:0D:0B:6E:4E:5F  102       32        0    0  11  54   WEP  WEP        
SHIMADA_AirStationG54-1             
 00:16:01:FA:8B:BB  102       54        0    0   6  54e  WEP  WEP         buffalo   

 BSSID              STATION            PWR   Rate    Lost  Packets  Probes          

 (not associated)   00:13:CE:34:C6:31  114    0 - 1      0       16  000D0B7046BE_A 

^C

I could also dump files with airodump-ng ...

Cant find any reason why wepbuster is not working please help me.

Original comment by Steffen....@gmail.com on 19 Jun 2009 at 2:08

GoogleCodeExporter commented 9 years ago
[deleted comment]
GoogleCodeExporter commented 9 years ago
i hope posted all usefull informations now and thanks in advance to help me out 
here

steffen@steffen-pc:~/Documents/tarball_staging$ sudo airodump-ng rausb0 -t wep

 CH 10 ][ Elapsed: 1 min ][ 2009-06-18 20:56                                   

 BSSID              PWR  Beacons    #Data, #/s  CH  MB   ENC  CIPHER AUTH ESSID

 00:1D:73:6B:FC:27  113       72        0    0   1  54e. WEP  WEP         35780
 00:1D:73:0F:50:1F  110       30        0    0  10  54e  WEP  WEP         12BA6
 06:1B:8B:AF:55:43  107        9        0    0   4  54e. WEP  WEP         WARPS
 00:60:1D:23:EE:3C  107       18        0    0  11  11   WEP  WEP         78040
 00:07:40:4D:6E:3C  105       23        0    0  11  54   WEP  WEP         SHIMAB
 00:16:01:FA:8B:BB  104       16        0    0   5  54e  WEP  WEP         buffaB
 00:0D:0B:6E:4E:5F  103        5        0    0  11  54   WEP  WEP         SHIMAB
                                                                               B
 BSSID              STATION            PWR   Rate    Lost  Packets  Probes     B
                                                                               B
 (not associated)   00:23:12:57:E3:CA   58    0 - 1      0       10  000D0B7046B
^C
steffen@steffen-pc:~/Documents/tarball_staging$ sudo perl wepbuster

=========================================================

No valid channel entered. Using the default ( US = 1 2 3 4 5 6 7 8 9 10 11 )

MODE: crack (using: rausb0/rausb0 == 00:16:01:9a:10:60)

Scanning channel 6 for WEP-enabled Access Points
..........
Found 0 AP(s) on channel 6

Scanning channel 11 for WEP-enabled Access Points
..........
Found 0 AP(s) on channel 11

Scanning channel 3 for WEP-enabled Access Points
..........
Found 0 AP(s) on channel 3

Scanning channel 7 for WEP-enabled Access Points
..........
Found 0 AP(s) on channel 7

Scanning channel 9 for WEP-enabled Access Points
..........
Found 0 AP(s) on channel 9

Scanning channel 2 for WEP-enabled Access Points
..........
Found 0 AP(s) on channel 2

Scanning channel 8 for WEP-enabled Access Points
..........
Found 0 AP(s) on channel 8

Scanning channel 4 for WEP-enabled Access Points
..........
Found 0 AP(s) on channel 4

Scanning channel 1 for WEP-enabled Access Points
..........
Found 0 AP(s) on channel 1

Scanning channel 10 for WEP-enabled Access Points
..........
Found 0 AP(s) on channel 10

Scanning channel 5 for WEP-enabled Access Points
..........
Found 0 AP(s) on channel 5

Found no AP. Exiting...

steffen@steffen-pc:~/Documents/tarball_staging$ 

Original comment by Steffen....@gmail.com on 19 Jun 2009 at 4:02

GoogleCodeExporter commented 9 years ago
I tried another thing:

steffen@steffen-pc:~$ sudo ps ax |grep perl && ps ax |grep air
[sudo] password for steffen: 
 5781 pts/0    S+     0:00 perl wepbuster
 5844 pts/0    S+     0:00 perl wepbuster
 5877 pts/1    S+     0:00 grep perl
 5845 pts/0    S+     0:00 airodump-ng rausb0 -t wep -c 9 -n -w chan9
 5879 pts/1    R+     0:00 grep air

steffen@steffen-pc:~$ sudo airodump-ng rausb0 -t wep -c 1 -n -w chan1

 CH  1 ][ Elapsed: 20 s ][ 2009-06-18 21:06                                    

 BSSID              PWR RXQ  Beacons    #Data, #/s  CH  MB   ENC  CIPHER AUTH E

 00:1D:73:6B:FC:27  114  32      211        0    0   1  54e. WEP  WEP         3

 BSSID              STATION            PWR   Rate    Lost  Packets  Probes     

 (not associated)   00:13:CE:34:C6:31  113    0 - 1      0        2  000D0B7046B
 (not associated)   00:23:12:57:E3:CA   60    0 - 1      0        1  000D0B7046B
^C
steffen@steffen-pc:~$ airodump-ng rausb0 -t wep -c 1 -n -w chan1
socket(PF_PACKET) failed: Operation not permitted
This program requires root privileges.

maybe the programm it self cant execute the airmon-ng command as root... thats 
why i
cant capture something... what do you think about that?

Original comment by Steffen....@gmail.com on 19 Jun 2009 at 4:10

GoogleCodeExporter commented 9 years ago
another thing:

locate airodump-ng.c --- no results

does that mean i have to download aircrack-ng first and then copy your 
precompiled
files into the folder??

Original comment by Steffen....@gmail.com on 19 Jun 2009 at 5:23