Search the Community
Showing results for tags 'aircrack-ng'.
Hey guys I am pretty new here in this forums guys my problem is that I using aircrack-ng method to get handhake but I am not getting it . I am doing everything correct with no error but time goes by . not getting any handshakes and I am sending infinty deauth packets to the victims but then also i did not get handshake and a client is there and by the way if I try the attack on my own network I get the handshakes in minutes. Please help me
BESSIDE-NG - Customized for Pineapple TETRA I'm writing a relative short post, as i don't feel like writing an entire article explaining how-to install this and use this. I've compiled a customized version of besside-ng, that will automatically scan all the channels from 1 to 165. The scan will take almost a minute to complete, compared to some seconds when only scanning the 2.4GHz range. Also added option to only scan WEP or WPA networks. I've also changed the directory that the logs gets saved to. They can now be found in /tmp The files are as usual: wep.cap, wpa.cap, bess
Hi, let me give you some introduction: I bought the nano months ago and pentested some of my old routers. Unfortunately I had to realize that the nano only can handle the 2.4 GHz frequency, but no problem, great product anyway. Most newer routers support both 2.4 to 5 GHz, so I decided to buy the tetra to continue pentesting with my network that has one brand new access point with both frequencies up at the same time. The start with the tetra was great, because with the "Recon" tab it's possible to scan both frequencies at the same time. Sorry I'm not a fan of the "M