Skip to main content

Aircrack-ng 1.0rc2

Updating is recommended, there was a lot of bug fixes and improvments and 2 new tools were added: airdecloak-ng and tkiptun-ng. On Aircrack-ng, WPA bugs should be fixed and speed was greatly improved for computers that supports SSE2. Latest version of Airgraph-ng and Airoscript were included in this release.

Important note: It does not support peek drivers.

Changelog:

aircrack-ng: Added SSE2 supports (WPA cracking speed is improved a lot) thanks to nx5.
aircrack-ng: Fixed detection of the number of CPU (especially with recent CPUs).
aircrack-ng: Fixed long lasting WPA bugs: cannot find the key with SMP computers, wasn't exiting correctly, ...
aircrack-ng: Fixed usage of a dictionnary with WEP.
aircrack-ng: Now only display ASCII WEP keys when 100% of the hex key can be converted to ASCII.
aircrack-ng: You can now specify the number of threads for cracking even if you have a non-SMP computer.
aircrack-ng: Now output an error message if using -r and it wasn't compiled with sqlite support. It was a problem on some ubuntu.
airdecloak-ng: New tool to remove wep cloaked frames from a pcap file. For more details see http://www.aircrack-ng.org/doku.php?id=airdecloak-ng
airodump-ng: Added kismet csv output support.
airodump-ng: Fixed power value display (for ath interface with a high number, more than 99).
airodump-ng: Can work on the new frequencies (allowed by frequency Chaos patch).
airodump-ng: Now display if the network has QoS enabled.
aireplay-ng: Fixed crash with too short packets (seen with zd1211).
aireplay-ng: Fixed STP usage in fragmentation attack.
aireplay-ng: Fixed bug with deauth attack.
airtun-ng: Fixed STP conversion.
airolib-ng: Added sample database in test/ directory.
tkip-tun: New tool to inject on WPA1 with QoS enabled networks. Full description: decrypt packets comming from the AP in a TKIP network, which uses QoS (ieee802.11e). It also breaks the MIC Key for sending packets towards the Client correctly encrypted and signed. Stores plaintext packet and keystream in seperate files.
airbase-ng: Several improvments ( See http://trac.aircrack-ng.org/ticket/466 ).
airbase-ng: Added compatibility with some clients. added random source IPs and MACs for cfrag attack (-N) to evade simple flood protection.
airmon-ng: Fixed some 'unary operator expected' errors.
airmon-ng: Fixed channel number setting with mac80211 drivers.
airmon-ng: Recognition of 4 new chipsets: acx1xx, at76_usb, adm8211 and AR9001U (otus).
airmon-ng: Fixed some chipset naming inconsistencies between ieee80211 and mac80211 drivers.
airmon-ng: Fixed display of "airmon-ng check".
airmon-ng: Improved mac80211 driver handling.
airdriver-ng: Fixed madwifi-ng driver download URL.
airdriver-ng: Updated openSuse information.
wesside-ng: Fixed open() with O_CREAT that needs 3 arguments.
osdep: Added TAP/TUN MTU getter.
manpages: Fixed misspelled airserv-ng manpage filename.
manpages: Added Airbase-ng, Tkiptun-ng manpages.
manpages: Updated description of all manpages.
Makefile: Fixed errors when compiling on OSX 10.5.
Makefile: Now ensure that make 3.81 or higher (mandatory) is used when compiling on OSX 10.4.
Makefile: Only install airolib-ng manpage if airolib-ng is installed.
Makefile: Added 'make check' that tests key cracking against files given in test/ directory.
general: Fixed 'evalrev' on Solaris.
general: Fixed compilation on Sun SPARC.
general: Fixed compilation on some distribution (with a recent version of gcc) due to warnings (because of not getting the return value of some functions).
general: Several compilation fixes.
patches: Updated ath5k patches
patches: Added rt2570 patch (kernel 2.6.24).
patches: Updated madwifi-ng patch for r3745.
patches: Updated mac80211 patches.
patches: Added zd1211rw patch for 2.6.26, b43/b43legacy for 2.6.26-wl.
patches: rt73, r8187 patches for fedora kernels (should work on 2.6.27).
patches: Added Defcon 16 patch (more frequencies than the usuals) for ath5k called frequency Chaos.
patches: Added injection patch for rtl8187 (mac80211).
patches: Added a universal mac80211 fragmentation and injection speed patch.
GUI (windows): Fixed: Windows GUI gives "please specify dictionnary".

Comments

Popular posts from this blog

ALFA-­AWUS036H & ALFA-­AWUS050NH INSTALLING/UPDATING DRIVERS RTL8187, r8187, RT2800usb on UBUNTU

NOTE: For surfing Internet with ALFA-AWUS050NH on Ubuntu Jaunty with rt2870sta driver, you must use the Kernel "2.6.28-11-generic #42-Ubuntu", without change or updates the drivers modules. NOTE: The tutorial is not related to Ubuntu karmic. Driver RTL8187/Stacks-­mac80211 (ref. ALFA-­AWUS036h) ­- These drivers, for surfing Internet, are more stable than r8187, and fully compatible with Network-Manager 0.7 installed by default on Ubuntu 9.04. Network-Manager 0.7 installed by default on Ubuntu 9.04. ­- Supports all encryption without problems. (OPEN, WEP and WPA/WPA2) ­- With Compat-Wireless, the "injection" working, but for support “Fragmentation attack” (opt. -5) you need to install one patch. - The RX sensitivity and packets injection is less, related to drivers r8187. Driver r8187/Stacks-ieee80211 (ref. ALFA-AWUS036h) - This driver is recommended for use with the Suite of Aircrack-ng, but not particularly suitable for Internet connections, as less stable and disc...

Sniffing SSL traffic using MITM attack / ettercap, fragrouter, webmitm and dnsspoof.

Before reading on this guide is for educational purposes only. I take no responsibility from what people do with this info. First thing is to get fragrouter. I don't know if you can use other tools provided with the backtrack, there are 100 ways to skin a cat and this is just my way. http://packetstormsecurity.nl/UNIX/IDS/nidsbench/fragrouter.html There are lots of things that you can do with fragrouter but we are going to use fragrouter to setup IP forwarding. We do this with this command : Code: fragrouter -B1Squash that window and put it to one side. Now open another shell and we will start dnsspoof with this command Code: dnsspoof -i ath0 (or whatever network interface you are using)Again put that window to one side and lets load up webmitm. Webmitm will issue our ssl cert to the victim so we can decrypt the traffic we capture. Start webmitm by typing Code: webmitm -dNow we can start the arp spoof. To start ettercap type Code: ettercap -T -M arp:remote /router addy/ /victim a...

Test New ALFA-AWUS036H v.2 (1.000mW) VS ALFA-AWUS036H v.1 (500mW)

- Recently emerged the New ALFA-AWUS036H v.2 (1.000mW), and these are the tests. TEST WITH NETSTUMBLER 1) usb da 100mW chipset railink 2) usb da 200mW chipset railink rt73 3) intel 2200 b/g con connettore esterno rp-sma 4) Alfa-AWUS036H 500mW 5) New Alfa-AWUS036H V2 da 1.000mW