

For WEP, you fake authentication with the access point to get it to send you packets, then send fragments of packets back to the AP (Access Point). The theory behind cracking access points is simple. There's SSL stripping, packet sniffing, MITM (Man-In-The-Middle) attacks, ARP poisoning-not to mention being completely anonymous by using someone else's Wi-Fi. After someone cracks an access point, possibilities are limitless. Would make the pineapple into a wifi nuke, and would not permit anyone to use any internetz except my pineapple, while still allowing my pineapple to connect to an access point to route internet to.If someone can access your wireless network that easily, this is NOT a good thing. I wouldn't be chasing this so much except that airdrop is said to support client deauth management as well as station. Copying//renaming the liborcon file to match what airdrop is looking for no longer gives me lorcon errors, however I do get the aforementioned error "Interface mon0 does not exist".

The file in question is available when lorcon2 is compiled, however it is named liborcon2-2.0.0.so, so the dependency error is still up. On the online man page for airdrop, it mentions that it doesnt support newer versions of lorcon, and gives instructions to download old lorcon, however when I go to run airdrop, I get a dependency error requiring a liborcon2.so file to be in a /usr/lib directory. The problem seems to be with the dependencies, as lorcon2 and pylocon are tough buggers. I am so confused and have spent 5 to 6 hours today trying to get Airdrop to work, to no avail. I am experiencing the same problem with both BT5R2 & R3. if you had a VM, you could snapshot before every update, but would require a USB wifi card to work with it.īy the way, R3, will be out in a few days, so unless you have a native install, you can download the latest when it comes out, or try a dist upgrade when it does for native installs. In general, most people either use it live, or in a VM. Might already be addressed and a fix, or could be corrupted install, which removing and reinstalling might fix, but everything BackTrack related is kind of touchy, so when in doubt, revert to the latest distro download.

Might be a new bug and a fix out soon if thats the case, try reporting it on the BackTrack bug tracker. I had thought he stopped development for a while too, since the attack, so curious to know what kind of updates we're made to aircrack. I do know the aircrack site was hacked into months ago, but as far as I know, source and binaries were not effected, only his forums I beleive. Try removing aircrack and then downloading it form their site directly, see what happens if you manually install it.
