cisco_pspf_bypass
Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
cisco_pspf_bypass [2010/08/11 17:53] – created lmeiners | cisco_pspf_bypass [2010/08/29 19:42] (current) – Fixed channel/frequency graph link mister_x | ||
---|---|---|---|
Line 3: | Line 3: | ||
By: Leandro Meiners and Diego Sor | By: Leandro Meiners and Diego Sor | ||
- | ====== Introduction ===== | + | ===== Introduction ===== |
This tutorial walks you through attacking an access point with PSPF enabled. The access point can be configured in WPA Migration Mode or as a WEP access point. It assumes you have a working wireless card with drivers already patched for injection. | This tutorial walks you through attacking an access point with PSPF enabled. The access point can be configured in WPA Migration Mode or as a WEP access point. It assumes you have a working wireless card with drivers already patched for injection. | ||
Line 93: | Line 93: | ||
Retry long limit: | Retry long limit: | ||
Power Management: | Power Management: | ||
- | |||
</ | </ | ||
Line 99: | Line 98: | ||
In the response above, you can see that mon0 is in monitor mode, on the 2.447GHz frequency which is channel 8 and the Access Point shows the MAC address of your wireless card. Please note that only the madwifi-ng drivers show the MAC address of your wireless card, the other drivers do not do this. So everything is good. It is important to confirm all this information prior to proceeding, otherwise the following steps will not work properly. | In the response above, you can see that mon0 is in monitor mode, on the 2.447GHz frequency which is channel 8 and the Access Point shows the MAC address of your wireless card. Please note that only the madwifi-ng drivers show the MAC address of your wireless card, the other drivers do not do this. So everything is good. It is important to confirm all this information prior to proceeding, otherwise the following steps will not work properly. | ||
- | To match the frequency to the channel, check out: http://www.rflinx.com/help/calculations/# | + | To match the frequency to the channel, check out: http://www.cisco.com/en/US/ |
==== Step 2 - Start airodump-ng to capture the IVs ==== | ==== Step 2 - Start airodump-ng to capture the IVs ==== |
cisco_pspf_bypass.1281542030.txt.gz · Last modified: 2010/08/11 17:53 by lmeiners