Sử dụng card mạng wifi USB Totolink A650UA không chạy được chế độ giám sát?

Tôi chạy Fern wifi cracker khi chọn wlan0 bị báo lỗi: ‘problem occured while setting up the monitor mode of selected’. card mạng wifi USB Totolink A650UA không chạy được chế độ giám sát ?

Please post in English that is the forums language of choice.

Anyway, for your device to work in monitor mode the wireless chipset must support it, and the driver being used has to expose the functionality to the OS

You need to find out what chipset is in your wifi adapter, and go from there.

lsusb

it looks like a realtek RTL8811CU chipset in that adapter from what I can tell.

I typed the command lsusb with the result:
Bus 001 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 001 Device 002: ID 0e0f:0003 VMware, Inc. Virtual Mouse
Bus 001 Device 003: ID 0e0f:0002 VMware, Inc. Virtual USB Hub
Bus 001 Device 020: ID 0e0f:0006 VMware, Inc. Virtual Keyboard
Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 002 Device 040: ID 0bda:2006 Realtek Semiconductor Corp. 802.11ac NIC

Do you think this network card does not support screen monitoring ?
Before running Fern WIFI Crack, I typed the command: iwconfig and got the result Mode: Managed

┌──(kali㉿kali)-[~]
└─$ iwconfig
lo no wireless extensions.

eth0 no wireless extensions.

wlan0 IEEE 802.11 ESSID:off/any
Mode:Managed Access Point: Not-Associated Tx-Power=0 dBm
Retry short limit:7 RTS thr:off Fragment thr:off
Power Management:on

Next I run Fern WIFI Crack, I type the command: iwconfig with the result: Mode:Monitor

┌──(kali㉿kali)-[~]
└─$ iwconfig
lo no wireless extensions.

eth0 no wireless extensions.

wlan0 IEEE 802.11 Mode:Monitor Frequency:2.457 GHz Tx-Power=20 dBm
Retry short limit:7 RTS thr:off Fragment thr:off
Power Management:on

I see that the network card has been switched to monitoring in this command, when I select wlan0 in the Fern WIFI Crack software, it still shows an error: ‘Fern wifi cracker: problem occured while setting up the monitor mode of selected’

According to you, which chipset wifi network card supports good monitoring today ? Can you list it ?

from your output, it looks like it should be working.
Try airgeddon and see if that works for you, fern is quite old now.

Just a heads up, if you want to test wifi hacking, you will need to downgrade the encryption to WEP or WPA v1 later versions of WPA2 and WPA3 encryption you’ll have little success with any of the tools, its not that it can’t be done in theory, its just that most newer devices aren’t as vulnerable as older devices were, and attacks will usually fail.

I tried to hack wifi encrypted WEP 2 or WEP 3 but it didn’t work. Up to now, which application can hack WEP2/WEP3 ?

WEP hackable, there are no WEP2 or WEP3 protocols, WPA version 1 hackable, WPA2 and WPA3 (which I suspect is what you actually mean), your wasting your time, whilst still technically possible, you don’t have enough tries, a modern router running these will lock you out after a few attempts at trying passwords, and most de-authorisation attempts will usually be ignored as well.

If you want to try it for ‘proof of concept’, you’ll need to downgrade your router to WEP or WPA encryption to be successful.

Realtek chipset wifi is flaky. A better supported mediatek chipset wifi adapter will work better.

According to you the product code supports well using mediatek chipset and do you know the best wifi hacking software today ?

I would invite you to watch this carefully before you try to hack any Wi-Fi for some reason

The key to understanding the solution to any problem, is first to understand the question

No offense intended, but you do not seem to understand the basics of networking and the protocols behind Wi-Fi

From Wikipedia:
WEP = Wired Equivalent Privacy (WEP) is an obsolete, severely flawed security algorithm for 802.11 wireless networks.

Most modern routers do not even offer WEP anymore. There is no WEP2 and WEP3. The more modern alternative is WPA which stands for Wi-Fi Protected Access. It started with WPA1 or simply WPA, then evolved to WPA2 and now we have WPA3. What @Fred and others are trying to tell you is that the encryption algorithm on WPA is much harder to break. WPA1 isn’t impossible to break but it requires time and effort. Really long time and lots of processing power that nobody would bother wasting time to do. Instead WPA2 and WPA3 are yet harder to crack as they use recent encryption methods and ciphers and algorithms with few flaws to exploit, and I personally did not hear of any successful breakthrough in WPA2 and WPA3 hacking to make it easily hackable like WEP.

First you answered my question, I asked WEP because there is a wifi hacking application in Microsoft Windows that gets the wifi list, when running in Win7 I see the security column WEP, WEP2, WPA, WPA2, WPA3,… I wonder about this security column, also this application running in Win10 I see the security column where WEP and WEP2 changed to CCNP I don’t understand clearly so I wonder if there is WEP3, etc… where CCNP is understood ?

If this is the case then this application is not trustworthy. The application developer either doesn’t know the basics of wireless networking or he created an application to fool users to get traffic to his app/website.

I am not aware of WEP2 and above, hence if an application is talking about WEP2 and above then I wouldn’t trust this app

Yea, I’ve never heard of anything called WEP2. The application prolly has documentation though. Might explain what it means.