User Tools

Site Tools


fake_authentication

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
fake_authentication [2010/03/14 23:12] – addresss should be address mister_xfake_authentication [2010/11/21 13:18] (current) – typos sleek
Line 4: Line 4:
 ===== Description ===== ===== Description =====
  
-The fake authentication attack allows you to perform the two types of WEP authentication (Open System and Shared Key) plus associate with the access point (AP).  This is useful is only useful when you need an associated MAC address in various [[aireplay-ng]] attacks and there is currently no associated client.  It should be noted that the fake authentication attack does NOT generate any ARP packets.  Fake authentication cannot be used to authenticate/associate with WPA/WPA2 Access Points.+The fake authentication attack allows you to perform the two types of WEP authentication (Open System and Shared Key) plus associate with the access point (AP).  This is only useful when you need an associated MAC address in various [[aireplay-ng]] attacks and there is currently no associated client.  It should be noted that the fake authentication attack does NOT generate any ARP packets.  Fake authentication cannot be used to authenticate/associate with WPA/WPA2 Access Points.
  
 ===== Usage ===== ===== Usage =====
Line 76: Line 76:
 Where: Where:
   * -1 means fake authentication   * -1 means fake authentication
-  * 0 means only athenticate once+  * 0 means only authenticate once
   * -e teddy is the SSID of the network   * -e teddy is the SSID of the network
   * -y sharedkey-04-00-14-6C-7E-40-80.xor is the name of file containing the PRGA xor bits   * -y sharedkey-04-00-14-6C-7E-40-80.xor is the name of file containing the PRGA xor bits
Line 124: Line 124:
 ==== Examples of successful authentications ==== ==== Examples of successful authentications ====
  
-When toubleshooting failed fake authentications, it can be helpful to do a packet capture and compare it to successful ones.  As well, simply reviewing this packet captures with WireShark can be very educational.+When troubleshooting failed fake authentications, it can be helpful to do a packet capture and compare it to successful ones.  As well, simply reviewing this packet captures with WireShark can be very educational.
  
 Here are packet captures of the two types of authentication - open and shared key: Here are packet captures of the two types of authentication - open and shared key:
Line 234: Line 234:
  
 ==== Error message "code (XX)" ==== ==== Error message "code (XX)" ====
-You receive an error messages referencing a code number.  This [[http://www.gthill.com/managementframes.pdf|Management Frames description]] is an excellent description of the various error codes you may receive.  Just look for the number relating to the authentication or association phase when you received the error.+You receive an error messages referencing a code number.  This [[http://download.aircrack-ng.org/wiki-files/other/managementframes.pdf|Management Frames description]] is an excellent description of the various error codes you may receive.  Just look for the number relating to the authentication or association phase when you received the error.
  
  
fake_authentication.txt · Last modified: 2010/11/21 13:18 by sleek