Solved

airodump & airocrack related

Posted on 2009-07-01
3
494 Views
Last Modified: 2012-05-07
I use backtrack.

1st question:
 
As you are aware, when you do a general capture(all channels) with airodump it records detected bssid as well as associated stations(informally wireless adapters).  I am trying to record as many associated stations as possible, but they come & go as they please during the airodump process which means I typically have to stop & restart airodump a billion times.

Does the dump file save all stations despite them disappearing from the screen and if so which programs can I use to open the dump file?

Question 2:

In relation to aircrack, e.g.
airecrack-ng -w *.1st -b 00.11:22:33:44:55(victim) *.cap
this launches a dictionary attack with the 1st file.
As you are aware, the passwords in such files are ASCII encoded; there not hex
I want to add hex passwords to this 1st file.
How do I do that knowing not all hex characters convert to ascii?
0
Comment
Question by:ericore
  • 2
3 Comments
 
LVL 9

Accepted Solution

by:
danyul_c earned 500 total points
ID: 24799261
Sounds like you are up to something shady! ;)

BUT, in answer to 1. If you capture to disk either the IVs or full packets you will also see as csv file gets generated. This will save the access points and associated stations in the csv file. Just open it with a text editor.

And for question 2. I would not see a problem here as any password in the dictionary will be sent in the standard format that every access point can understand. Aircrack will convert it to s standard string before sending it even if it did read hex passwords.

Are you trying to crack WPA or WEP?
0
 
LVL 9

Expert Comment

by:danyul_c
ID: 24799270
Another great tool for exploring the surrounding networks floating through the air is kismet.

You can really nail down through the layers there and see what is connected to each AP and it also can generate a csv file.
0
 

Author Comment

by:ericore
ID: 25001629
I forwarded this question too prematurely, nevertheless danyul is correct.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

In a recent article here at Experts Exchange (http://www.experts-exchange.com/articles/18880/PaperPort-14-in-Windows-10-A-First-Look.html), I discussed my nine-month sandbox testing of the Windows 10 Technical Preview, specifically with respect to r…
The purpose of this article is to demonstrate how we can use conditional statements using Python.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

26 Experts available now in Live!

Get 1:1 Help Now