Closed GoogleCodeExporter closed 9 years ago
Test done using an Atheros card, and ran on BT4... This test proved to be
successful.
Just wanna say well done to the creator. Guess you can now release a final
version.
It wasn't all bread and butter at my end to make this work. I had to edit some
part of
the codes, and even delete a line. If you wanna know what I did, just let me
know and
I will email it to you. I used the precompile (aircrack-ng and airodump-ng)...
================================================================================
========
ghostface@bt:/mnt/sda1/Wepbuster-3# perl wepbuster
Detecting wireless interfaces...
---------------------------------------------------
Found wifi0...
Getting monitor interface...
monitor interface --> wlan0
---------------------------------------------------
Found wlan0...
Getting monitor interface...
monitor interface --> mon0
---------------------------------------------------
Found ath0...
Getting monitor interface...
monitor interface --> ath0
Found 3 useable wireless card(s)
Select which one to use [1] (You HAVE 5 seconds)
1) wlan0/wlan0
2) wlan0/mon0
3) ath0/ath0
3
MODE: crack (using: ath0/ath0 == AA:BB:CC:DD:EE:FF)
.
Scanning channel 6 for WEP-enabled Access Points
...............
Found 1 AP(s) on channel 6
BSSID IV CHANNEL ESSID ASSOCIATED CLIENTS
00:00:00:00:00:00 0 6 UPLINK xx:xx:xx:xx:xx:xx
.
Scanning channel 11 for WEP-enabled Access Points
...............
Found 0 AP(s) on channel 11
.
Scanning channel 1 for WEP-enabled Access Points
...............
Found 0 AP(s) on channel 1
Total AP found: 1
Now starting to crack...
#########################################################
Pwning "UPLINK" (00:00:00:00:00:00)
Checking for mac filtering... NONE!! =)
Trying to associate... SUCCESS!!!
Starting to inject...
Sending Deauth...
Counting IVs...(hit ENTER to skip this AP)
1007....1784.....2632.....3473.....4282.....5236.....6164.
....6982.....7800.....8990.....9773.....10619.....11478.
....12280.....13031.....13873.....14532.....15093.....15869.
....16653...
Collected 17082 IVs. Trying to crack..
KEY FOUND! [ EE:DD:CC:BB:AA ] Decrypted correctly: 100%
OWNED USING 17116 IVs!
Stopping all forks...
#########################################################
Original comment by ghostfac...@gmail.com
on 8 Jun 2009 at 12:47
Hey, good to hear you made it work.. I made warnings though, in the
Troubleshooting
page of not using a live CD yet as the program was not tested on such platform.
Further, live CDs usually are customized so if one feature of aircrack-ng was
removed, wepbuster might not work out of the box. By the way, what concerns me
more
is the fact that the program has detected 3 interfaces.. Were all those
interfaces
correctly identified??? Can you provide more details about the cards? If no one
is
going to complain about card detection, then wepbuster should be on its way to a
release version now or at least a "real" beta release...
Original comment by subscr1b...@gmail.com
on 8 Jun 2009 at 1:00
Here is the details of the cards...
DLink (DWA-110) Interface = wlan0 | chipset = Ralink USB | Driver = rt73usb -
[phy0]
Atheros () Interface = wifi0 | chipset = Atheros | Driver = madwifi-ng
DLink (DWA-510) Interface = wlan0 | chipset = Ralink 2561 PCI | Driver =
rt61pci -
[phy0]
The above cards were used along with Backtrack 4 Beta for the testing.
Original comment by ghostfac...@gmail.com
on 8 Jun 2009 at 3:32
i see.. so having two interfaces with the same name is just normal.... i've
noticed there's two wlan0...
Original comment by markjays...@gmail.com
on 8 Jun 2009 at 4:02
Original comment by markjays...@gmail.com
on 12 Jun 2009 at 5:07
Original issue reported on code.google.com by
ghostfac...@gmail.com
on 7 Jun 2009 at 12:04