User Tools

Site Tools


main

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Next revisionBoth sides next revision
main [2017/03/27 22:48] – Blog post: lesser known features of Aircrack-ng mister_xmain [2018/03/11 18:43] – [News] Blog post: Migration to GitHub mister_x
Line 32: Line 32:
  
 ^Date^Title^Content^ ^Date^Title^Content^
-^27 Mar 2017|Blog post: lesser known features of Aircrack-ng|In [[https://aircrack-ng.blogspot.com/2017/03/less-known-features-of-aircrack-ng.html|this blog post]], we'll discuss lesser known features of Aircrack-ng such as reading compressed wordlists, rainbow tables and distributed cracking.| +^11 Mar 2018|Blog post: Migration to GitHub|We finally made it completely, we migrated from trac and subversion to GitHub. It was far from a simple program to run and switch to GitHub, it was a lot more complex task. You can find more details on [[https://aircrack-ng.blogspot.com/2018/03/migration-to-github.html|this blog post]].| 
-^20 Feb 2017|Blog post: iw monitor flags|When setting an interface in monitor mode manually, [[https://wireless.wiki.kernel.org/en/users/documentation/iw|iw]] has a few different flags: none, fcsfail, control, otherbss, cook, active. \\ The meaning of those different flags are explained in [[https://aircrack-ng.blogspot.com/2017/02/monitor-mode-flags.html|the blog post]]. \\ \\ TL;DR: use 'none'.| +^16 Oct 2017|Blog post: KRACK WPA Vulnerability - Key Reinstallation AttaCK|In [[https://aircrack-ng.blogspot.com/2017/10/krack-wpa-vulnerability-key.html|this blog post]], the new KRACK vulnerability is explained: a brief summary, who's affected, what to do and links to resources related to the vulnerability. \\ \\ TL;DR: Another day, another vulnerability, just patch your systems. It allows decryption of traffic but does not disclose the WPA key.| 
-^20 Jan 2017|BlackHat USA training|I'm really pleased to announce that Vivek Ramachandran and I will be teaching [[https://www.blackhat.com/us-17/training/advanced-wireless-exploitation.html|Advanced Wireless Exploitation]] at BlackHat USA this summer.| +^16 Aug 2017|Blog post: On drivers, rtl8812au, WN722N, monitor mode, QCA6174, other news ...|In [[https://aircrack-ng.blogspot.com/2017/08/on-drivers-rtl8812au-wn722n-monitor.html|this blog post]], we answer some common questions regarding various topics: using drivers, driver development, embedded chipsets, 802.11n/ac capture/injection, a few different current chipsets/drivers (rtl8812au, ath9k_htc, QCA6174), linux-backports (aka compat-wireless) and some other good news.|
-^30 Nov 16|Wireless Pawn Edition (WPE) patches updated|If you want to attack WPA Enterpriseapplying WPE patches to HostAPd or Freeradius would do the jobHoweverthey haven't been updated in long time and still used old software versions (HostAPd 2.2 and Freeradius 2.1 which is EOL). \\ \\ It is no longer the case as they are now available for the latest and greatest version of HostAPd and Freeradius. We took the job upon ourselves to update them and keep updating them whenever a new versions get released. The icing on the cake is that both of them are available as packages in Kali and a tutorial for HostAPd-WPE has been created. \\ \\ All the details as well as a link to the patches can be found in [[https://www.offensive-security.com/penetration-testing/hacking-wpa-enterprise-with-kali-linux/|this blog post]].|+
  
-[[morenews|More news...]] +[[morenews|More news...]]
 ====== Download ====== ====== Download ======
  
 ===== Current version ===== ===== Current version =====
  
-Latest version: 1.2 RC 3+Latest version: 1.2 RC 4
  
-  * [[http://download.aircrack-ng.org/aircrack-ng-1.2-rc3.tar.gz|Linux]] ([[http://patches.aircrack-ng.org/|Driver patches]])+  * [[http://download.aircrack-ng.org/aircrack-ng-1.2-rc4.tar.gz|Linux]] ([[http://patches.aircrack-ng.org/|Driver patches]])
  
 ** IMPORTANT ** Information Regarding Windows Version ** IMPORTANT **\\ ** IMPORTANT ** Information Regarding Windows Version ** IMPORTANT **\\
main.txt · Last modified: 2023/01/16 20:04 by mister_x