Results 1 to 9 of 9

Thread: aircrack tested 0 keys. Help?

  1. #1
    Join Date
    2015-Dec
    Posts
    17

    aircrack tested 0 keys. Help?

    I've got a network where I've captured roughly 40,000 IVs. The key was decrypted successfully and unless I'm missing a step I can't figure out what I'm doing wrong.

    This is a WEP network that I'm using a dictionary attack on.

    Here is the input and output in terminal.

    Code:
    root@peepee:~# aircrack-ng -c -w /root/Downloads/500-worst-passwords.txt /root/Desktop/FBI-02.cap
    Opening /root/Desktop/FBI-02.cap
    Read 331845 packets.
    
       #  BSSID              ESSID                     Encryption
    
       1  00:1F:33:C7:CD:10  FBI                       WEP (43380 IVs)
    
    Choosing first network as target.
    
    Opening /root/Desktop/FBI-02.cap
    Reading packets, please wait...
    
                                     Aircrack-ng 1.2 rc3
    
    
                     [00:00:00] Tested 0 keys (got 43380 IVs)
    
       KB    depth   byte(vote)
        0    0/  0   00(   0) 00(   0) 00(   0) 00(   0) 00(   0) 
        1    0/  0   00(   0) 00(   0) 00(   0) 00(   0) 00(   0) 
        2    0/  0   00(   0) 00(   0) 00(   0) 00(   0) 00(   0) 
        3    0/  0   00(   0) 00(   0) 00(   0) 00(   0) 00(   0) 
        4    0/  0   00(   0) 00(   0) 00(   0) 00(   0) 00(   0) 
        5    0/  0   00(   0) 00(   0) 00(   0) 00(   0) 00(   0) 
        6    0/  0   00(   0) 00(   0) 00(   0) 00(   0) 00(   0) 
        7    0/  0   00(   0) 00(   0) 00(   0) 00(   0) 00(   0) 
        8    0/  0   00(   0) 00(   0) 00(   0) 00(   0) 00(   0) 
        9    0/  0   00(   0) 00(   0) 00(   0) 00(   0) 00(   0) 
       10    0/  0   00(   0) 00(   0) 00(   0) 00(   0) 00(   0) 
       11    0/  0   00(   0) 00(   0) 00(   0) 00(   0) 00(   0) 
       12    0/  0   00(   0) 00(   0) 00(   0) 00(   0) 00(   0) 
    
    
    
    Quitting aircrack-ng...

  2. #2
    Join Date
    2015-Apr
    Posts
    29
    Zero key because the key is not in the dictionary that you were using. you can try wifite or wifite-ng.

  3. #3
    Join Date
    2015-Dec
    Posts
    17
    Quote Originally Posted by TheMantis View Post
    Zero key because the key is not in the dictionary that you were using. you can try wifite or wifite-ng.
    Does it really test the keys THAT fast? My dictionary file is somewhere close to 250mb. The elapsed time also shows 00:00:00, which to me means it never started. Am I wrong?

  4. #4
    Your dictionary for WEP may not be correct.
    Could you show us a couple of line from it?

  5. #5
    Join Date
    2015-Dec
    Posts
    17
    Quote Originally Posted by kcdtv View Post
    Your dictionary for WEP may not be correct.
    Could you show us a couple of line from it?
    This is just the first few lines

    Code:
    123456
    password
    12345678
    1234
    *****
    12345
    dragon
    qwerty
    696969
    mustang
    letmein
    I tried wifite, pixiewps, reaver, aircrack. The signal is around -50 where I can get the best signal...maybe it's just not strong enough?

  6. #6
    Join Date
    2015-Apr
    Posts
    29
    that wordlist is not for WEP, it's for WPA.

  7. #7
    Join Date
    2015-Dec
    Posts
    17
    Quote Originally Posted by TheMantis View Post
    that wordlist is not for WEP, it's for WPA.
    Makes sense why it wouldn't work. I'm a noob so I didn't know. How would WEP look?

  8. #8
    It has to be in hexadecimal.form (the "long key" with two points (":") in your aircrack-ng windows)

    if you crack a 64bits WEP it should be something like this
    Code:
    12:34:56:78:90
    AA:BB:33:55:FF
    Ten hexadecimal digits with pair separated by two points.

    If your network in encrypted with WEP 128 bits than it has to be like this
    Code:
    11:22:33:44:55:66:77:88:99:00:AA:BB:CC
    FF:EE:12:34:56:78:90:B1:23:45:89:00:77
    26 hexadecimal digits separated by two points.

    unless you have a clear idea about a pattern to follow it is not possible to brute force it ... even if the charset is limited to hexadecimal that still 26 digits long!

  9. #9
    Join Date
    2013-Apr
    Location
    Kali forums
    Posts
    805
    There are some great tutorials on the aircrack-ng website. I recommend going through them...they will really help you get the most out of aircrack.

Similar Threads

  1. Replies: 3
    Last Post: 2015-09-11, 23:40
  2. SSHv1 keys
    By sg4rb0 in forum TroubleShooting Archive
    Replies: 0
    Last Post: 2015-03-04, 12:14
  3. I have a question regarding GPG Keys
    By sozo in forum Installing Archive
    Replies: 1
    Last Post: 2015-01-28, 08:05
  4. System halted aircrack when searching wordlist for keys
    By lstkst in forum TroubleShooting Archive
    Replies: 2
    Last Post: 2014-02-23, 16:33

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •