User Tools

Site Tools


cisco_pspf_bypass

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
cisco_pspf_bypass [2010/08/11 17:53]
lmeiners created
cisco_pspf_bypass [2010/08/29 19:42] (current)
mister_x Fixed channel/frequency graph link
Line 3: Line 3:
 By: Leandro Meiners and Diego Sor By: Leandro Meiners and Diego Sor
  
-====== Introduction =====+===== Introduction =====
  
 This tutorial walks you through attacking an access point with PSPF enabled. The access point can be configured in WPA Migration Mode or as a WEP access point. It assumes you have a working wireless card with drivers already patched for injection. This tutorial walks you through attacking an access point with PSPF enabled. The access point can be configured in WPA Migration Mode or as a WEP access point. It assumes you have a working wireless card with drivers already patched for injection.
Line 93: Line 93:
           Retry  long limit:​7 ​  RTS thr:​off ​  ​Fragment thr:off           Retry  long limit:​7 ​  RTS thr:​off ​  ​Fragment thr:off
           Power Management:​off           Power Management:​off
-          
 </​code> ​ </​code> ​
  
Line 99: Line 98:
 In the response above, you can see that mon0 is in monitor mode, on the 2.447GHz frequency which is channel 8 and the Access Point shows the MAC address of your wireless card. Please note that only the madwifi-ng drivers show the MAC address of your wireless card, the other drivers do not do this. So everything is good. It is important to confirm all this information prior to proceeding, otherwise the following steps will not work properly. ​ In the response above, you can see that mon0 is in monitor mode, on the 2.447GHz frequency which is channel 8 and the Access Point shows the MAC address of your wireless card. Please note that only the madwifi-ng drivers show the MAC address of your wireless card, the other drivers do not do this. So everything is good. It is important to confirm all this information prior to proceeding, otherwise the following steps will not work properly. ​
  
-To match the frequency to the channel, check out: http://www.rflinx.com/help/calculations/#​2.4ghz_wifi_channels then select the “Wifi ​Channel ​Selection and Channel Overlap” tab. This will give you the frequency for each channel.+To match the frequency to the channel, check out: http://www.cisco.com/en/US/​docs/​wireless/​technology/​channel/​deployment/​guide/Channel.html#​wp134132 ​. This will give you the frequency for each channel.
  
 ==== Step 2 - Start airodump-ng to capture the IVs ==== ==== Step 2 - Start airodump-ng to capture the IVs ====
cisco_pspf_bypass.1281542030.txt.gz · Last modified: 2010/08/11 17:53 by lmeiners