Re: PPP authentication brute-force attack?

From: LordDoskias (lorddoskias@gmail.com)
Date: Tue Feb 12 2008 - 09:29:27 EST


Matheus Michels wrote:
>> PAP basically is plain text. Why don't you just sniff the passwords off
>> the wire?
>>
>
> Is just this what I originally wanted to do, using Wireshark. But, for some reason, it doesn't capture PAP packets other than those sent by my machine. All other protocols are captured OK. I've posted a question about this in the Wireshark mailing list, but no replies. I'm in a wireless LAN, so this puzzles me.
> _________________________________________________________________
> Shed those extra pounds with MSN and The Biggest Loser!
> http://biggestloser.msn.com/
>
You have to put your wireless card in "monitoring" mode and then you can
sniff packets coming from other peers of the WLAN. I think there was
something on the topic at aircrack-ng's wiki. Check this link:
http://www.aircrack-ng.org/doku.php?id=faq
 paste from above link:
"Under Linux, simply setup the card in monitor mode with the airmon-ng
<http://www.aircrack-ng.org/doku.php?id=airmon-ng> script. Under
Windows, Wireshark can capture 802.11 packets using AirPcap
<http://www.cacetech.com/products/airpcap.htm>. Except in very rare
cases, Ethereal cannot capture 802.11 packets under Windows."

------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:58:24 EDT