cisco_pspf_bypass
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
cisco_pspf_bypass [2010/08/11 17:54] – lmeiners | cisco_pspf_bypass [2010/08/29 19:42] (current) – Fixed channel/frequency graph link mister_x | ||
---|---|---|---|
Line 3: | Line 3: | ||
By: Leandro Meiners and Diego Sor | By: Leandro Meiners and Diego Sor | ||
- | ====== Introduction ===== | + | ===== Introduction ===== |
This tutorial walks you through attacking an access point with PSPF enabled. The access point can be configured in WPA Migration Mode or as a WEP access point. It assumes you have a working wireless card with drivers already patched for injection. | This tutorial walks you through attacking an access point with PSPF enabled. The access point can be configured in WPA Migration Mode or as a WEP access point. It assumes you have a working wireless card with drivers already patched for injection. | ||
Line 98: | Line 98: | ||
In the response above, you can see that mon0 is in monitor mode, on the 2.447GHz frequency which is channel 8 and the Access Point shows the MAC address of your wireless card. Please note that only the madwifi-ng drivers show the MAC address of your wireless card, the other drivers do not do this. So everything is good. It is important to confirm all this information prior to proceeding, otherwise the following steps will not work properly. | In the response above, you can see that mon0 is in monitor mode, on the 2.447GHz frequency which is channel 8 and the Access Point shows the MAC address of your wireless card. Please note that only the madwifi-ng drivers show the MAC address of your wireless card, the other drivers do not do this. So everything is good. It is important to confirm all this information prior to proceeding, otherwise the following steps will not work properly. | ||
- | To match the frequency to the channel, check out: http://www.rflinx.com/help/calculations/# | + | To match the frequency to the channel, check out: http://www.cisco.com/en/US/ |
==== Step 2 - Start airodump-ng to capture the IVs ==== | ==== Step 2 - Start airodump-ng to capture the IVs ==== |
cisco_pspf_bypass.txt · Last modified: 2010/08/29 19:42 by mister_x