Sorry for the delay guys. Here are the outputs of the above commands and a few notes of my own:
lsusb:
Code:
root@kali:~# lsusb
Bus 001 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub
Bus 002 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub
Bus 003 Device 002: ID 0bda:817f Realtek Semiconductor Corp. RTL8188RU 802.11n WLAN Adapter
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 003 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 004 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
Bus 001 Device 005: ID 05e3:0608 Genesys Logic, Inc. USB-2.0 4-Port HUB
Bus 001 Device 004: ID 0bda:0129 Realtek Semiconductor Corp.
Bus 002 Device 003: ID 04f2:b2e2 Chicony Electronics Co., Ltd
Bus 001 Device 006: ID 046d:c06a Logitech, Inc.
Bus 001 Device 007: ID 09da:0260 A4 Tech Co., Ltd
airmon-ng:
Code:
root@kali:~# airmon-ng
Interface Chipset Driver
wlan0 Atheros AR9485 ath9k - [phy0]
wlan1 Unknown rtl8192cu - [phy1]
iw dev wlan1 scan: (when associated to a network)
Code:
root@kali:~# iw dev wlan1 scan
BSS c8:3a:35:53:7b:28 (on wlan1) -- associated
TSF: 1079198965 usec (0d, 00:17:59)
freq: 2447
beacon interval: 100
capability: ESS Privacy ShortSlotTime (0x0411)
signal: -48.00 dBm
last seen: 80 ms ago
Information elements from Probe Response frame:
SSID: test_network
Supported rates: 1.0* 2.0* 5.5 11.0 18.0 24.0 36.0 54.0
DS Parameter set: channel 8
ERP: <no flags>
RSN: * Version: 1
* Group cipher: TKIP
* Pairwise ciphers: CCMP TKIP
* Authentication suites: PSK
* Capabilities: 16-PTKSA-RC (0x000c)
Extended supported rates: 6.0 9.0 12.0 48.0
HT capabilities:
Capabilities: 0x187e
HT20/HT40
SM Power Save disabled
RX Greenfield
RX HT20 SGI
RX HT40 SGI
No RX STBC
Max AMSDU length: 7935 bytes
DSSS/CCK HT40
Maximum RX AMPDU length 65535 bytes (exponent: 0x003)
Minimum RX AMPDU time spacing: 8 usec (0x06)
HT RX MCS rate indexes supported: 0-7
HT TX MCS rate indexes are undefined
HT operation:
* primary channel: 8
* secondary channel offset: below
* STA channel width: any
* RIFS: 1
* HT protection: no
* non-GF present: 1
* OBSS non-GF present: 0
* dual beacon: 0
* dual CTS protection: 0
* STBC beacon: 0
* L-SIG TXOP Prot: 0
* PCO active: 0
* PCO phase: 0
WMM: * Parameter version 1
* BE: CW 15-1023, AIFSN 3
* BK: CW 15-1023, AIFSN 7
* VI: CW 7-15, AIFSN 2, TXOP 3008 usec
* VO: CW 3-7, AIFSN 2, TXOP 1504 usec
airmon-ng start wlan1:
Code:
root@kali:~# airmon-ng start wlan1
Interface Chipset Driver
wlan0 Atheros AR9485 ath9k - [phy0]
wlan1 Unknown rtl8192cu - [phy1]
(monitor mode enabled on mon0)
aireplay-ng -9 mon0:
Code:
root@kali:~# aireplay-ng -9 mon0
10:17:38 Trying broadcast probe requests...
10:17:40 No Answer...
10:17:40 Found 0 APs
This one I added myself, in hopes of it being useful. I think it is :O
aireplay-ng -9 -e test_network -a C8:3A:35:53:7B:28 -i wlan0 wlan1:
Code:
root@kali:~# aireplay-ng -9 -e test_network -a C8:3A:35:53:7B:28 -i wlan0 wlan1
10:22:54 Waiting for beacon frame (BSSID: C8:3A:35:53:7B:28) on channel 8
10:22:54 Trying broadcast probe requests...
10:22:55 Injection is working!
10:22:56 Found 1 AP
10:22:56 Trying directed probe requests...
10:22:56 C8:3A:35:53:7B:28 - channel: 8 - 'test_network
10:22:57 Ping (min/avg/max): 9.032ms/35.387ms/70.948ms Power: -40.63
10:22:57 30/30: 100%
10:22:57 Trying card-to-card injection...
10:22:57 Attack -0: OK
10:22:57 Attack -1 (open): OK
10:22:57 Attack -1 (psk): OK
10:22:58 Attack -2/-3/-4/-6: OK
10:22:58 Attack -5/-7: OK
The TX-power is 20dB as you may have noticed. It would be nice to get it to work at 33dB.
Patiently awaiting your insight my dudes.