

In my study and review of wireless attacks, I have recently grown very frustrated because I simply could get any of the basic WEP attacks working: ARP replay, Korek chop-chop, fragmentation, interactive packet replay.

As soon as it arrives I’ll update this journal with test results. I found an Alfa AWUS036H, which is the card recommended for WiFu, and the card that also seems to work for other with this attack. Hopefully this explains why it is not working.


The -5 attack is the fragmentation attack, so it appears that the Alfa AWUS036NHA does not support the attack. I thought I would share this in case anyone else is having a similar issue.įor the test, I have two wireless cards/dongles:įor the first test, I am checking the capabilities of the Alfa card. In reviewing notes, I came across the card-to-card injection test. If there is anything I can send to the devs, please let me know the address and what to send.I have been unable to get the Aircrack-ng fragmentation against WEP open authentication to work against my DIR-601 or OpenWRT APs. Any ideas on what to look at next? I'd be happy to provide any logs or config file information if needed. I've tried some ideas that a Google search provided, opening a web page to pass traffic, then refreshing interfaces, etc but still no joy. My guess here is that monitor mode must be working on the usb wifi adapter since I can see open ports and IPs in nmap/Zenmap, but for some reason it's not being seen by Wireshark (3.0.5 if it matters). However, when I open Wireshark, only my BT and Ethernet connections are showing. I now have USBPcap 1.5.3.0 and Win10Pcap installed, and nmap 7.80 seems to be working just fine. Anyhow, I tried various versions and combinations of usbpcap, npcap, and win10pcap. I also uninstalled VMWare as it added several virtual network adapters and a bridge that I thought may be causing problems. I've reinstalled the latest drivers from Panda for the wifi adapter. It's a Lenovo laptop running Win 10 1809. So I had to reinstall Windows 10 on my laptop, and proceeded to break a working wifi monitoring setup.
