Penetration Testing mailing list archives

RE: PPP authentication brute-force attack?


From: Matheus Michels <matheusf_michels () hotmail com>
Date: Wed, 13 Feb 2008 02:52:07 +0000


You have to put your wireless card in "monitoring" mode and then you can 
sniff packets coming from other peers of the WLAN. I think there was 
something on the topic at aircrack-ng's wiki. Check this link:
http://www.aircrack-ng.org/doku.php?id=faq
 paste from above link:
"Under Linux, simply setup the card in monitor mode with the airmon-ng 
 script. Under 
Windows, Wireshark can capture 802.11 packets using AirPcap 
. Except in very rare 
cases, Ethereal cannot capture 802.11 packets under Windows."

I had already tried the monitor mode, but even in it I cannot capture PAP requests coming from the clients. I even 
tried leaving Kismet sniffing for several hours and open its log file after in Wireshark. It's interesting that I can 
capture PPPoE Active Discovery Initializations, 802.11 headers and even PAP Ack's, but nothing of PAP requests other 
than mine. There are clients logging in and off all the time, so this is absurd.

Actually, I think that the trouble is on my wireless card driver (ACX100 20080210). Maybe some bug in the driver, who 
knows? This driver has always been buggy for me. I will get other card and try again.

Thanks.
_________________________________________________________________
Need to know the score, the latest news, or you need your Hotmail®-get your "fix".
http://www.msnmobilefix.com/Default.aspx
------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------


Current thread: