Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

airodump & airocrack related

Posted on 2009-07-01
3
Medium Priority
?
505 Views
Last Modified: 2012-05-07
I use backtrack.

1st question:
 
As you are aware, when you do a general capture(all channels) with airodump it records detected bssid as well as associated stations(informally wireless adapters).  I am trying to record as many associated stations as possible, but they come & go as they please during the airodump process which means I typically have to stop & restart airodump a billion times.

Does the dump file save all stations despite them disappearing from the screen and if so which programs can I use to open the dump file?

Question 2:

In relation to aircrack, e.g.
airecrack-ng -w *.1st -b 00.11:22:33:44:55(victim) *.cap
this launches a dictionary attack with the 1st file.
As you are aware, the passwords in such files are ASCII encoded; there not hex
I want to add hex passwords to this 1st file.
How do I do that knowing not all hex characters convert to ascii?
0
Comment
Question by:ericore
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 9

Accepted Solution

by:
danyul_c earned 2000 total points
ID: 24799261
Sounds like you are up to something shady! ;)

BUT, in answer to 1. If you capture to disk either the IVs or full packets you will also see as csv file gets generated. This will save the access points and associated stations in the csv file. Just open it with a text editor.

And for question 2. I would not see a problem here as any password in the dictionary will be sent in the standard format that every access point can understand. Aircrack will convert it to s standard string before sending it even if it did read hex passwords.

Are you trying to crack WPA or WEP?
0
 
LVL 9

Expert Comment

by:danyul_c
ID: 24799270
Another great tool for exploring the surrounding networks floating through the air is kismet.

You can really nail down through the layers there and see what is connected to each AP and it also can generate a csv file.
0
 

Author Comment

by:ericore
ID: 25001629
I forwarded this question too prematurely, nevertheless danyul is correct.
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Sometimes a user will call me frantically, explaining that something has gone wrong and they have tried everything (read - they have messed it up more and now need someone to clean up) and it still does no good, can I help them?!  Usually the standa…
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question