Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision |
main [2017/03/27 22:48] – Blog post: lesser known features of Aircrack-ng mister_x | main [2017/08/16 23:56] – [News] Blog post: On drivers, rtl8812au, WN722N, monitor mode, QCA6174, other news ... mister_x |
---|
| |
^Date^Title^Content^ | ^Date^Title^Content^ |
^27 Mar 2017|Blog post: lesser known features of Aircrack-ng|In [[https://aircrack-ng.blogspot.com/2017/03/less-known-features-of-aircrack-ng.html|this blog post]], we'll discuss lesser known features of Aircrack-ng such as reading compressed wordlists, rainbow tables and distributed cracking.| | ^16 Aug 2017|Blog post: On drivers, rtl8812au, WN722N, monitor mode, QCA6174, other news ...|In [[https://aircrack-ng.blogspot.com/2017/08/on-drivers-rtl8812au-wn722n-monitor.html|this blog post]], we answer some common questions regarding various topics: using drivers, driver development, embedded chipsets, 802.11n/ac capture/injection, a few different current chipsets/drivers (rtl8812au, ath9k_htc, QCA6174), linux-backports (aka compat-wireless) and some other good news.| |
^20 Feb 2017|Blog post: iw monitor flags|When setting an interface in monitor mode manually, [[https://wireless.wiki.kernel.org/en/users/documentation/iw|iw]] has a few different flags: none, fcsfail, control, otherbss, cook, active. \\ The meaning of those different flags are explained in [[https://aircrack-ng.blogspot.com/2017/02/monitor-mode-flags.html|the blog post]]. \\ \\ TL;DR: use 'none'.| | ^9 Aug 2017|Blog post: lesser known features of Aircrack-ng: interactive mode and keys|In [[https://aircrack-ng.blogspot.com/2017/08/lesser-known-feature-of-aircrack-ng.html|this blog post]], we discuss another lesser known features of Aircrack-ng: interactive mode and keys in airodump-ng.| |
^20 Jan 2017|BlackHat USA training|I'm really pleased to announce that Vivek Ramachandran and I will be teaching [[https://www.blackhat.com/us-17/training/advanced-wireless-exploitation.html|Advanced Wireless Exploitation]] at BlackHat USA this summer.| | ^27 Mar 2017|Blog post: lesser known features of Aircrack-ng|In [[https://aircrack-ng.blogspot.com/2017/03/less-known-features-of-aircrack-ng.html|this blog post]], we discuss some lesser known features of Aircrack-ng such as reading compressed wordlists, rainbow tables and distributed cracking.| |
^30 Nov 16|Wireless Pawn Edition (WPE) patches updated|If you want to attack WPA Enterprise, applying WPE patches to HostAPd or Freeradius would do the job. However, they haven't been updated in a long time and still used old software versions (HostAPd 2.2 and Freeradius 2.1 which is EOL). \\ \\ It is no longer the case as they are now available for the latest and greatest version of HostAPd and Freeradius. We took the job upon ourselves to update them and keep updating them whenever a new versions get released. The icing on the cake is that both of them are available as packages in Kali and a tutorial for HostAPd-WPE has been created. \\ \\ All the details as well as a link to the patches can be found in [[https://www.offensive-security.com/penetration-testing/hacking-wpa-enterprise-with-kali-linux/|this blog post]].| | |
| |
[[morenews|More news...]] | [[morenews|More news...]] |
====== Download ====== | ====== Download ====== |
| |
===== Current version ===== | ===== Current version ===== |
| |
Latest version: 1.2 RC 3 | Latest version: 1.2 RC 4 |
| |
* [[http://download.aircrack-ng.org/aircrack-ng-1.2-rc3.tar.gz|Linux]] ([[http://patches.aircrack-ng.org/|Driver patches]]) | * [[http://download.aircrack-ng.org/aircrack-ng-1.2-rc4.tar.gz|Linux]] ([[http://patches.aircrack-ng.org/|Driver patches]]) |
| |
** IMPORTANT ** Information Regarding Windows Version ** IMPORTANT **\\ | ** IMPORTANT ** Information Regarding Windows Version ** IMPORTANT **\\ |