User Tools

Site Tools


main

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Next revisionBoth sides next revision
main [2017/03/27 22:48] – Blog post: lesser known features of Aircrack-ng mister_xmain [2017/10/17 05:28] – [News] Blog post: KRACK WPA Vulnerability - Key Reinstallation AttaCK mister_x
Line 32: Line 32:
  
 ^Date^Title^Content^ ^Date^Title^Content^
-^27 Mar 2017|Blog post: lesser known features of Aircrack-ng|In [[https://aircrack-ng.blogspot.com/2017/03/less-known-features-of-aircrack-ng.html|this blog post]], we'll discuss lesser known features of Aircrack-ng such as reading compressed wordlistsrainbow tables and distributed cracking.| +^16 Oct 2017|Blog post: KRACK WPA Vulnerability Key Reinstallation AttaCK|In [[https://aircrack-ng.blogspot.com/2017/10/krack-wpa-vulnerability-key.html|this blog post]], the new KRACK vulnerability is explained: a brief summary, who's affectedwhat to do and links to resources related to the vulnerability. \\ \\ TL;DR: Another day, another vulnerability, just patch your systems. It allows decryption of traffic but does not disclose the WPA key.| 
-^20 Feb 2017|Blog post: iw monitor flags|When setting an interface in monitor mode manually[[https://wireless.wiki.kernel.org/en/users/documentation/iw|iw]] has a few different flags: none, fcsfail, control, otherbss, cook, active. \\ The meaning of those different flags are explained in [[https://aircrack-ng.blogspot.com/2017/02/monitor-mode-flags.html|the blog post]]. \\ \\ TL;DRuse 'none'.+^16 Aug 2017|Blog post: On drivers, rtl8812au, WN722N, monitor mode, QCA6174, other news ...|In [[https://aircrack-ng.blogspot.com/2017/08/on-drivers-rtl8812au-wn722n-monitor.html|this blog post]], we answer some common questions regarding various topicsusing drivers, driver development, embedded chipsets, 802.11n/ac capture/injection, a few different current chipsets/drivers (rtl8812au, ath9k_htc, QCA6174), linux-backports (aka compat-wireless) and some other good news.|
-^20 Jan 2017|BlackHat USA training|I'm really pleased to announce that Vivek Ramachandran and I will be teaching [[https://www.blackhat.com/us-17/training/advanced-wireless-exploitation.html|Advanced Wireless Exploitation]] at BlackHat USA this summer.| +
-^30 Nov 16|Wireless Pawn Edition (WPEpatches updated|If you want to attack WPA Enterpriseapplying WPE patches to HostAPd or Freeradius would do the job. However, they haven't been updated in a long time and still used old software versions (HostAPd 2.2 and Freeradius 2.1 which is EOL). \\ \\ It is no longer the case as they are now available for the latest and greatest version of HostAPd and Freeradius. We took the job upon ourselves to update them and keep updating them whenever a new versions get released. The icing on the cake is that both of them are available as packages in Kali and a tutorial for HostAPd-WPE has been created. \\ \\ All the details as well as a link to the patches can be found in [[https://www.offensive-security.com/penetration-testing/hacking-wpa-enterprise-with-kali-linux/|this blog post]].|+
  
-[[morenews|More news...]] +[[morenews|More news...]]
 ====== Download ====== ====== Download ======
  
 ===== Current version ===== ===== Current version =====
  
-Latest version: 1.2 RC 3+Latest version: 1.2 RC 4
  
-  * [[http://download.aircrack-ng.org/aircrack-ng-1.2-rc3.tar.gz|Linux]] ([[http://patches.aircrack-ng.org/|Driver patches]])+  * [[http://download.aircrack-ng.org/aircrack-ng-1.2-rc4.tar.gz|Linux]] ([[http://patches.aircrack-ng.org/|Driver patches]])
  
 ** IMPORTANT ** Information Regarding Windows Version ** IMPORTANT **\\ ** IMPORTANT ** Information Regarding Windows Version ** IMPORTANT **\\
main.txt · Last modified: 2023/01/16 20:04 by mister_x