User Tools

Site Tools


main

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
main [2017/02/21 07:01]
mister_x [News] Blog post: iw monitor flags
main [2017/10/17 05:28] (current)
mister_x [News] Blog post: KRACK WPA Vulnerability - Key Reinstallation AttaCK
Line 32: Line 32:
  
 ^Date^Title^Content^ ^Date^Title^Content^
-^20 Feb 2017|Blog post: iw monitor flags|When setting an interface in monitor mode manually, [[https://​wireless.wiki.kernel.org/​en/​users/​documentation/​iw|iw]] has a few different flags: none, fcsfail, control, otherbss, cook, active. \\ The meaning of those different flags are explained in [[https://​aircrack-ng.blogspot.com/​2017/​02/monitor-mode-flags.html|the blog post]]. \\ \\ TL;​DR: ​use '​none'​.| +^16 Oct 2017|Blog post: KRACK WPA Vulnerability - Key Reinstallation AttaCK|In [[https://​aircrack-ng.blogspot.com/​2017/​10/krack-wpa-vulnerability-key.html|this blog post]], the new KRACK vulnerability is explained: a brief summary, who's affected, what to do and links to resources related to the vulnerability. \\ \\ TL;​DR: ​Another day, another vulnerability,​ just patch your systems. It allows decryption of traffic but does not disclose the WPA key.| 
-^20 Jan 2017|BlackHat USA training|I'm really pleased to announce that Vivek Ramachandran and I will be teaching ​[[https://www.blackhat.com/us-17/training/advanced-wireless-exploitation.html|Advanced Wireless Exploitation]] at BlackHat USA this summer.| +^16 Aug 2017|Blog post: On drivers, rtl8812au, WN722N, monitor mode, QCA6174, other news ...|In [[https://aircrack-ng.blogspot.com/2017/08/on-drivers-rtl8812au-wn722n-monitor.html|this blog post]], we answer some common questions regarding various topics: using drivers, driver development,​ embedded chipsets, 802.11n/ac capture/​injection, a few different current chipsets/​drivers ​(rtl8812au, ath9k_htc, QCA6174), linux-backports (aka compat-wireless) and some other good news.|
-^30 Nov 16|Wireless Pawn Edition (WPE) patches updated|If you want to attack WPA Enterpriseapplying WPE patches to HostAPd or Freeradius would do the jobHoweverthey haven'​t been updated in long time and still used old software versions ​(HostAPd 2.2 and Freeradius 2.1 which is EOL). \\ \\ It is no longer the case as they are now available for the latest and greatest version of HostAPd and Freeradius. We took the job upon ourselves to update them and keep updating them whenever a new versions get released. The icing on the cake is that both of them are available as packages in Kali and a tutorial for HostAPd-WPE has been created. \\ \\ All the details as well as a link to the patches can be found in [[https://​www.offensive-security.com/​penetration-testing/​hacking-wpa-enterprise-with-kali-linux/​|this blog post]].|+
  
-[[morenews|More news...]] ​+[[morenews|More news...]]
 ====== Download ====== ====== Download ======
  
 ===== Current version ===== ===== Current version =====
  
-Latest version: 1.2 RC 3+Latest version: 1.2 RC 4
  
-  * [[http://​download.aircrack-ng.org/​aircrack-ng-1.2-rc3.tar.gz|Linux]] ([[http://​patches.aircrack-ng.org/​|Driver patches]])+  * [[http://​download.aircrack-ng.org/​aircrack-ng-1.2-rc4.tar.gz|Linux]] ([[http://​patches.aircrack-ng.org/​|Driver patches]])
  
 ** IMPORTANT ** Information Regarding Windows Version ** IMPORTANT **\\ ** IMPORTANT ** Information Regarding Windows Version ** IMPORTANT **\\
main.1487656865.txt.gz · Last modified: 2017/02/21 07:01 by mister_x