faq
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
faq [2009/10/21 17:01] – Clarified max packets needed. darkaudax | faq [2018/02/25 02:26] – Added some useful FAQ entries from Wireshark mister_x | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== FAQ ====== | ====== FAQ ====== | ||
+ | ===== What version of Aircrack-ng am I running ? ===== | ||
+ | |||
+ | Run ' | ||
+ | |||
===== What is the best wireless card to buy ? ===== | ===== What is the best wireless card to buy ? ===== | ||
- | Which card to purchase is a hard question to answer. | + | Which card to purchase is a hard question to answer. |
- | * Alfa AWUS036H | + | * Alfa AWUS036H |
- | * Ubiquiti SRC | + | * Ubiquiti SRC [a/b/g Cardbus] |
+ | * Ubiquiti SRX [a/b/g ExpressCard] | ||
+ | * Airpcap series [USB] | ||
+ | * TP-Link TL-WN722N v1 [b/g/n USB] - Beware, if version is not specified by vendor, it is **NOT** v1 | ||
+ | * Alfa AWUS036NHA [b/g/n USB] | ||
+ | * Alfa AWUS051NH v2 [a/b/g/n USB] | ||
+ | * MiniPCIe: anything that uses [[https:// | ||
- | If money is a constraint then consider purchasing a card with a RTL8187L, RT73 or Atheros chipset. | + | If money is a constraint then consider purchasing a card with a RTL8187L or Atheros chipset, also read [[compatibility_drivers# |
If you want to know if your existing card is compatible then use this page: [[compatible_cards|Tutorial: | If you want to know if your existing card is compatible then use this page: [[compatible_cards|Tutorial: | ||
Line 19: | Line 29: | ||
The [[links]] page also generic wireless information and tutorials. | The [[links]] page also generic wireless information and tutorials. | ||
+ | |||
+ | ===== Any GPS recommendation ? ===== | ||
+ | |||
+ | The following 2 devices have been tested and work fine: | ||
+ | |||
+ | * BU-353 | ||
+ | * NL-402U USB | ||
+ | |||
+ | However, anything that is [[http:// | ||
===== " | ===== " | ||
Line 30: | Line 49: | ||
Since that time, the PTW approach (Pychkine, Tews, Weinmann) has been developed. The main advantage of the PTW approach is that very few data packets are required to crack the WEP key. | Since that time, the PTW approach (Pychkine, Tews, Weinmann) has been developed. The main advantage of the PTW approach is that very few data packets are required to crack the WEP key. | ||
- | |||
- | |||
===== How many IVs are required to crack WEP ? ===== | ===== How many IVs are required to crack WEP ? ===== | ||
Line 39: | Line 56: | ||
There is no way to know the WEP key length: this information is kept hidden and never announced, either in management or data packets; as a consequence, | There is no way to know the WEP key length: this information is kept hidden and never announced, either in management or data packets; as a consequence, | ||
- | The figures above are based on using the Korek method. | + | The figures above are based on using the Korek method. |
Line 65: | Line 82: | ||
The easiest way is do an Internet search for word lists and dictionaries. Also check out web sites for password cracking tools. Many times they have references to word lists. A few sources follow. Please add comments or additions to this thread: http:// | The easiest way is do an Internet search for word lists and dictionaries. Also check out web sites for password cracking tools. Many times they have references to word lists. A few sources follow. Please add comments or additions to this thread: http:// | ||
+ | |||
+ | Remember that valid passwords are 8 to 63 characters in length. The [[http:// | ||
* OpenWall: | * OpenWall: | ||
* ftp:// | * ftp:// | ||
* http:// | * http:// | ||
- | * ftp://ftp.ox.ac.uk/pub/wordlists/ | + | * GitHub |
+ | * https://github.com/ | ||
+ | * https:// | ||
+ | * https:// | ||
* http:// | * http:// | ||
- | * http:// | ||
- | * http:// | ||
* ftp:// | * ftp:// | ||
* http:// | * http:// | ||
- | * http:// | ||
* http:// | * http:// | ||
* http:// | * http:// | ||
* http:// | * http:// | ||
- | * http:// | ||
- | * http:// | ||
* http:// | * http:// | ||
* http:// | * http:// | ||
- | * http:// | + | * http:// |
- | + | * https://darkz0ne.net/wordlists | |
- | ==== Build your own ==== | + | |
- | + | ||
- | Here are a few resources to build your own lists. | + | |
- | + | ||
- | *[[https://code.goto10.org/svn/ | + | |
- | *[[http:// | + | |
- | *[[http:// | + | |
- | *[[http:// | + | |
===== How do I recover my WEP/WPA key in windows ? ===== | ===== How do I recover my WEP/WPA key in windows ? ===== | ||
Line 141: | Line 150: | ||
From the command line you may use the // | From the command line you may use the // | ||
- | mergecap -w out.cap test1.cap test2.cap test3.cap | + | mergecap |
+ | |||
+ | It will merge test1.cap, test2.cap | ||
- | It will merge test1.cap, test2.cap and test3.cap into out.cap | + | mergecap -F pcap *.cap -w out.cap |
+ | |||
+ | It will merge all the .cap files contained in the current folder | ||
You may use the [[tools# | You may use the [[tools# | ||
Line 366: | Line 379: | ||
To determine the frequency that a channel uses (or vice versa), check out: | To determine the frequency that a channel uses (or vice versa), check out: | ||
- | http://www.rflinx.com/help/calculations/#2.4ghz_wifi_channels then select | + | [[http://www.cisco.com/en/US/docs/ |
Line 435: | Line 448: | ||
===== Why do I get ' | ===== Why do I get ' | ||
- | Some drivers require a firmware to be loaded (b43, prism54, zd1211rw, ...). The driver | + | Some drivers require a firmware to be loaded (b43, prism54, zd1211rw, ...). The driver |
- | In this case, the driver didn't find it because the firmware was not in the right place. To find the firmware' | + | In this case, the driver didn't find it because the firmware was not in the right place or is missing from the computer. To find the firmware' |
Line 469: | Line 482: | ||
Solution: Disable this function in UDEV | Solution: Disable this function in UDEV | ||
- | Open / | + | Open / |
Search for | Search for | ||
Line 483: | Line 496: | ||
Save and close. | Save and close. | ||
- | Open / | + | Open / |
Search for the lines concerning your nwc and delete or just disable them by inserting a leading "#" | Search for the lines concerning your nwc and delete or just disable them by inserting a leading "#" | ||
Line 515: | Line 528: | ||
===== What is RSSI? ==== | ===== What is RSSI? ==== | ||
- | RSSI is means Received Signal Strength Indication. RSSI is a measurement of the received radio signal strength. It is the received signal strength in a wireless environment, | + | RSSI means Received Signal Strength Indication. RSSI is a measurement of the received radio signal strength. It is the received signal strength in a wireless environment, |
For more information, | For more information, | ||
Line 561: | Line 574: | ||
See [[airmon-ng# | See [[airmon-ng# | ||
- | |||
- | |||
- | |||
===== How Do I Check What Mode My Card Is In? ===== | ===== How Do I Check What Mode My Card Is In? ===== | ||
Line 575: | Line 585: | ||
[[http:// | [[http:// | ||
+ | |||
+ | |||
+ | ===== Why do I get "Error creating tap interface: Permission denied" | ||
+ | |||
+ | You receive one or both of the following errors: | ||
+ | error creating tap interface: Permission denied | ||
+ | error opening tap device: Permission denied | ||
+ | |||
+ | This is caused by SELinux (Security Enhanced Linux) preventing the interface from starting. | ||
+ | |||
+ | ===== Why airodump-ng doesn' | ||
+ | |||
+ | By default, in settings, stty rows and columns are set to 0. Here are the settings: | ||
+ | * stty columns 86 | ||
+ | * stty rows 39 | ||
+ | |||
+ | =====How much does Aircrack-ng cost?===== | ||
+ | |||
+ | Aircrack-ng is "free software"; | ||
+ | The license under which Aircrack-ng is issued is mostly the GNU General Public License version 2. See the GNU GPL FAQ for some more information. | ||
+ | |||
+ | You may also want to check out the OpenSSL license included in our source code download. | ||
+ | |||
+ | =====But I just paid someone on eBay for a copy of Aircrack-ng! Did I get ripped off?===== | ||
+ | |||
+ | That depends. Did they provide any sort of value-added product or service, such as installation support, installation media, training, trace file analysis, or funky-colored socks? Probably not. | ||
+ | Aircrack-ng is available for anyone to download, absolutely free, at any time. Paying for a copy implies that you should get something for your money. | ||
+ | |||
+ | =====Can I use Aircrack-ng commercially? | ||
+ | |||
+ | Yes, if, for example, you mean "I work for a commercial organization; | ||
+ | |||
+ | If you mean "Can I use Aircrack-ng as part of my commercial product?", | ||
+ | |||
+ | =====Can I use Aircrack-ng as part of my commercial product? | ||
+ | |||
+ | As noted, Aircrack-ng is licensed under the GNU General Public License, version 2. The GPL imposes conditions on your use of GPL'ed code in your own products; you cannot, for example, make a " | ||
+ | You can combine a GPLed program such as Aircrack-ng and a commercial program as long as they communicate "at arm's length", | ||
+ | |||
+ | We recommend keeping Aircrack-ng and your product completely separate. | ||
+ | |||
+ | You may also want to check out the OpenSSL license included in our source code download. | ||
faq.txt · Last modified: 2024/01/10 16:40 by mister_x