User Tools

Site Tools


fake_authentication

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
fake_authentication [2009/08/14 19:02]
mister_x use dokuwiki internal links + fixed typo
fake_authentication [2010/11/21 13:18] (current)
sleek typos
Line 4: Line 4:
 ===== Description ===== ===== Description =====
  
-The fake authentication attack allows you to perform the two types of WEP authentication (Open System and Shared Key) plus associate with the access point (AP).  This is useful ​is only useful when you need an associated MAC address in various [[aireplay-ng]] attacks and there is currently no associated client. ​ It should be noted that the fake authentication attack does NOT generate any ARP packets. ​ Fake authentication cannot be used to authenticate/​associate with WPA/WPA2 Access Points.+The fake authentication attack allows you to perform the two types of WEP authentication (Open System and Shared Key) plus associate with the access point (AP).  This is only useful when you need an associated MAC address in various [[aireplay-ng]] attacks and there is currently no associated client. ​ It should be noted that the fake authentication attack does NOT generate any ARP packets. ​ Fake authentication cannot be used to authenticate/​associate with WPA/WPA2 Access Points.
  
 ===== Usage ===== ===== Usage =====
Line 15: Line 15:
   *-e teddy is the wireless network name   *-e teddy is the wireless network name
   *-a 00:​14:​6C:​7E:​40:​80 is the access point MAC address   *-a 00:​14:​6C:​7E:​40:​80 is the access point MAC address
-  *-h 00:​09:​5B:​EC:​EE:​F2 is our card MAC addresss+  *-h 00:​09:​5B:​EC:​EE:​F2 is our card MAC address
   *-y sharedkeyxor is the name of file containing the PRGA xor bits.  This is only used for shared key authentication. ​ Open system authentication,​ which is typical, does not require this.   *-y sharedkeyxor is the name of file containing the PRGA xor bits.  This is only used for shared key authentication. ​ Open system authentication,​ which is typical, does not require this.
   *ath0 is the wireless interface name   *ath0 is the wireless interface name
Line 43: Line 43:
   *-e teddy is the wireless network name   *-e teddy is the wireless network name
   *-a 00:​14:​6C:​7E:​40:​80 is the access point MAC address   *-a 00:​14:​6C:​7E:​40:​80 is the access point MAC address
-  *-h 00:​09:​5B:​EC:​EE:​F2 is our card MAC addresss+  *-h 00:​09:​5B:​EC:​EE:​F2 is our card MAC address
   *ath0 is the wireless interface name   *ath0 is the wireless interface name
  
Line 76: Line 76:
 Where: Where:
   * -1 means fake authentication   * -1 means fake authentication
-  * 0 means only athenticate ​once+  * 0 means only authenticate ​once
   * -e teddy is the SSID of the network   * -e teddy is the SSID of the network
   * -y sharedkey-04-00-14-6C-7E-40-80.xor is the name of file containing the PRGA xor bits   * -y sharedkey-04-00-14-6C-7E-40-80.xor is the name of file containing the PRGA xor bits
Line 124: Line 124:
 ==== Examples of successful authentications ==== ==== Examples of successful authentications ====
  
-When toubleshooting ​failed fake authentications,​ it can be helpful to do a packet capture and compare it to successful ones.  As well, simply reviewing this packet captures with WireShark can be very educational.+When troubleshooting ​failed fake authentications,​ it can be helpful to do a packet capture and compare it to successful ones.  As well, simply reviewing this packet captures with WireShark can be very educational.
  
 Here are packet captures of the two types of authentication - open and shared key: Here are packet captures of the two types of authentication - open and shared key:
Line 234: Line 234:
  
 ==== Error message "code (XX)" ==== ==== Error message "code (XX)" ====
-You receive an error messages referencing a code number. ​ This [[http://www.gthill.com/​managementframes.pdf|Management Frames description]] is an excellent description of the various error codes you may receive. ​ Just look for the number relating to the authentication or association phase when you received the error.+You receive an error messages referencing a code number. ​ This [[http://download.aircrack-ng.org/​wiki-files/​other/​managementframes.pdf|Management Frames description]] is an excellent description of the various error codes you may receive. ​ Just look for the number relating to the authentication or association phase when you received the error.
  
  
fake_authentication.1250269371.txt.gz ยท Last modified: 2009/08/14 19:02 by mister_x