2010/9/14 Robin Wood <[email protected]>:
> On 14 September 2010 08:53, Bert Van Kets <[email protected]> wrote:
>>  Hi guys,
>>
>> I'm giving my first InfoSec presentation on Thursday and wanted to show
>> the insecurity of WEP by hacking the key of my own router and then
>> showing the traffic of another computer on the wireless network.
>> The first part is covered, but I fail getting airtun-ng to run (although
>> it ran a couple of days ago). I do a modprobe airtun and then run
>> aitun-ng -a [AP mac] -w [wep key] mon0.
>> mon0 is created using airmon-ng on my Alfa card. The aitrun-ng command
>> tells me the at0 interface is created, but does not return to the
>> command prompt. Wireshark or iwconfig do not see the interface.
>>
>> I'm also trying to get NetworkMiner 0.92 to sniff wep encrypted traffic
>> on Windows, but it only lists my own traffic, nothing from other
>> machines. I use the WinPCap driver from WireShark.
>>
>> Anybody got any help/ideas?

You need to have an AirPcap device from CACE Tech to do live WiFi
sniffing with NetworkMiner.
However, as Robin suggests I recommend sniffing to a pcap file with
some other tool.

After you've decrypted the WEP traffic I suppose NetworkMiner would be
perfect for showing what stuff you've caught while sniffing.

/erik

>>
>
> I can't help with the problems but can I suggest you take a canned
> pcap file that you know you can crack the WEP key on just in case.
> I've done various WEP cracking demos and sometimes you get the key in
> seconds and some times sods law kicks in and it takes ages, too long
> to have a quiet pause during a demo.
>
> Robin
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
>
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to