User Tools

Site Tools


i_am_injecting_but_the_ivs_don_t_increase

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revisionBoth sides next revision
i_am_injecting_but_the_ivs_don_t_increase [2008/05/09 23:40] netrolller3di_am_injecting_but_the_ivs_don_t_increase [2008/05/09 23:41] netrolller3d
Line 178: Line 178:
  
 Although you can't see it, the above command started generating the IVs.  As usual, run [[airodump-ng]] and [[aircrack-ng]]. Although you can't see it, the above command started generating the IVs.  As usual, run [[airodump-ng]] and [[aircrack-ng]].
 +
  
  
Line 186: Line 187:
   * With some drivers, the wireless card MAC address must be the same as MAC address you are injecting. So if fake authentication is still not working then try changing the card MAC to the same one you are trying to authenticate with.  A typical package to do this is macchanger.  Search the forums or the internet for the details and other options.  Changing the MAC address is beyond the scope of this tutorial.  See [[faq#how_do_i_change_my_card_s_mac_address|How do I change my card's MAC address?]]   * With some drivers, the wireless card MAC address must be the same as MAC address you are injecting. So if fake authentication is still not working then try changing the card MAC to the same one you are trying to authenticate with.  A typical package to do this is macchanger.  Search the forums or the internet for the details and other options.  Changing the MAC address is beyond the scope of this tutorial.  See [[faq#how_do_i_change_my_card_s_mac_address|How do I change my card's MAC address?]]
  
-  * Some access points are configured to only allow selected MAC access to associate and connect.  If this is the case, you will not be able to successfully do fake authentication unless you know one of the MAC addresses on the allowed list.  Thus ,the advantage of the next technique (interactive replay) is that it gets around this control.+  * Some access points are configured to only allow selected MAC access to associate and connect.  If this is the case, you will not be able to successfully do fake authentication unless you know one of the MAC addresses on the allowed list.  Thus, the advantage of the next technique (interactive replay) is that it gets around this control.
  
 To determine if MAC access control is in place, enter the following command: To determine if MAC access control is in place, enter the following command:
i_am_injecting_but_the_ivs_don_t_increase.txt · Last modified: 2018/03/11 20:14 by mister_x