RE: PPP authentication brute-force attack?

From: Matheus Michels (matheusf_michels@hotmail.com)
Date: Tue Feb 12 2008 - 21:52:07 EST


> You have to put your wireless card in "monitoring" mode and then you can
> sniff packets coming from other peers of the WLAN. I think there was
> something on the topic at aircrack-ng's wiki. Check this link:
> http://www.aircrack-ng.org/doku.php?id=faq
> paste from above link:
> "Under Linux, simply setup the card in monitor mode with the airmon-ng
> script. Under
> Windows, Wireshark can capture 802.11 packets using AirPcap
> . Except in very rare
> cases, Ethereal cannot capture 802.11 packets under Windows."

I had already tried the monitor mode, but even in it I cannot capture PAP requests coming from the clients. I even tried leaving Kismet sniffing for several hours and open its log file after in Wireshark. It's interesting that I can capture PPPoE Active Discovery Initializations, 802.11 headers and even PAP Ack's, but nothing of PAP requests other than mine. There are clients logging in and off all the time, so this is absurd.

Actually, I think that the trouble is on my wireless card driver (ACX100 20080210). Maybe some bug in the driver, who knows? This driver has always been buggy for me. I will get other card and try again.

Thanks.
_________________________________________________________________
Need to know the score, the latest news, or you need your HotmailŪ-get your "fix".
http://www.msnmobilefix.com/Default.aspx
------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:58:24 EDT