LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Closed Thread
  Search this Thread
Old 01-21-2010, 12:59 PM   #1
Gachl
LQ Newbie
 
Registered: Jun 2009
Posts: 12

Rep: Reputation: 0
airpwn useage


Hi folks!

In school I have to make a presentation of airpwn and I want to demonstrate how it works. Now, for this experiment I've got a WEP secured AP and two notebooks, one with bt4-pre-final and one with vista and a alfa network wireless card (can do that passive listening stuff).
I tried to follow this instruction and basically, I can start airpwn with these settings:
Code:
airpwn -c configs/testconfig -d prism54 -i wlan0 -l testlog1.log -k 35:35:35:35:35 -v -v
Now, this network called "demo" uses the key 35:35:35:35:35 and runs on channel 6. If I start airpwn with the parameters form above and I type "6" while it's running it (should) switches to channel 6.

Surprisingly airpwn prints stuff like
Quote:
Matched pattern for conf 'test'
wrote 150 bytes to the wire(less)
[19:55:30] injecting data for conf 'test'
So, in the opinion of airpwn, it works. But on the vista notebook I still get the requested page, no injected material.

The testconfig looks like this:
Quote:
begin test
match ^(GET|POST)
ignore ^GET [^ ?]+\.(?i:jpg|jpeg:gifng)
option reset
response response/test
the response file:
Quote:
HTTP/1.1 200 OK
Connection: close
Content-Type: text/html

<html><head><title>Success</title></head><body>GET and POST are now blocked.</body></html>
My presentation is next monday, so I don't have much time left D:
Can someone help?
 
Old 01-22-2010, 03:39 AM   #2
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Gachl, while providing help with vulnerability assessment and the like is perfectly acceptable here, penetration testing is a different issue which must be addressed accordingly. Most of the time, the only difference between a penetration tester and an actual cracker is the ethics each has subscribed to, which we simply have no way to verify on this medium. As such, LQ members who provide assistance with issues related to these types of tools could easily find themselves in violation of the LQ Rules. That's not a situation we'd like to encourage, and it's the reason why I'm closing this thread.

Last edited by win32sux; 01-22-2010 at 07:59 AM. Reason: Spelling.
 
0 members found this post helpful.
  


Closed Thread



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
cpu useage? linuxgeek13 Linux - General 3 10-03-2005 06:00 PM
useage phoenix_fei Programming 1 01-18-2005 07:59 PM
Rant: Excel Useage trey85stang General 11 01-06-2005 08:45 AM
Memory Useage InSane103 Linux - Hardware 3 07-12-2003 12:15 AM
memory useage doodah Linux - Software 6 06-01-2001 08:58 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 06:31 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration