Finally, I’ve had time to write down my notes on using aircrack-ng with the Airpcap Tx adapter in Windows. Before you read on, please be aware that this isn’t meant to be a guide or tutorial, it’s just my notes. Thanky 🙂
airodump-ng \\.\airpcap00 airpcap CHANNELNUMBER mycapturefile
aireplay-ng –fakeauth 0 -e “MYSSID” -a BSSIDMAC -h … Read more »
This is pretty cool: Whilst searching for an alternative to HyperTerminal that supports Serial Port connections, I discovered that PuTTY now connects to Serial COM ports as well as the usual SSH/Telnet stuff 😀
As a business you can’t use HyperTerminal Private Edition unless you pay a licence fee; and now that Microsoft has removed HyperTerminal … Read more »
Every time you deploy a WEP Access Point, a fluffy kitty dies.
Recently a team of German cryptography researchers perfected methods to recover a WEP key faster than ever before. The older Weak IV attacks generally needed between 500,000 and 2,000,000 packets to recover a 128-bit WEP key. In contrast, the new PTW method needs a … Read more »
As of version 0.9, the aircrack-ng suite natively supports the PTW attack. Download it here. To invoke the PTW attack in aircrack-ng, run it with the -z switch: aircrack-ng.exe -z mycapturefile.cap.
A French chap has compiled Aircrack-PTW for Windows. This is great for anyone using the AirPcap adapter to inject packets in Windows, as the new … Read more »
If you’re setting up 802.1x on your Network connection but can’t see the Authentication tab, make sure the “Wireless Zero Configuration” service is running.
Start > Run… > services.msc
Find the Wireless Zero Configuration service.
Right click on it, and choose “Start”.
The Authentication tab will then appear on your Network connection properties.
Yes, I know. But apparently, to get … Read more »