Hello all,
I don’t know if anyone out there has played around with aircrack, but I can’t seem to get ARP-request replay attack to work correctly.
The problem is everytime I run the following code:
aireplay -3 -b 00:13:10:30:24:9C -h 00:11:22:33:44:55 eth0
I get the following message:
Saving ARP request in replay_arp_1203-14640.cap
You must also start airodump to capture replies.
Got a deauth/disassoc packet from the AP - Is the source MAC associated?
Read 5999(got 0 ARP requests), sent 0 packets …
In the past I’ve run this on a laptop with no problems, but for some reason it gives me this message when I use on my Zaurus.
My Zaurus c760 is running PDAXROM 1.1.0beta3, Symbol CF card.
Thanks,
Virtusrex
[div align=\"right\"][a href=\"index.php?act=findpost&pid=125729\"][{POST_SNAPBACK}][/a][/div]
I have not tried Aircrack myself but I have spent quite a lot of time playing with security tools on various Z platforms including pdaXrom. My advice is first to run tcpdump or ethereal and ensure that you can capture data in promiscuous mode. I've tried pdaXrom on a C3000 with an Ambicom card and had no luck. To capture data intended for other hosts I must put the wireless card into full RF monitor mode and if you do that, then you cant send packets!
I have never used a C7xx model so I dont know if the same holds true but I suspect it will and that this is your problem. Incidentally, I've come across some laptops have this problem too.
When I use the Sharp ROM, promiscuous mode works perfectly which is why I favour it for security applications. By installing PocketWorkstation you can get all the latest security tools and actually get full use of them through the console using the chroot command!
For information, I could not get Cacko on the C3000 to operate in promiscuous mode. I've also tried the latest versions of OZ (OPIE and GPE). In both cases, they did appear to operate correctly for a short time but then stopped capturing. Dont know why which is a shame because the new releases do look very promising.