Para master, saya ingin bertanya . .
bagaimana cara menginstal aircrack di ubuntu . .
mohon pencerahannya
[help]
- Exapmi
- Contact:
- vlad_78
- Contact:
saya juga pernah coba install aircrack di ubuntu gan.
tapi selalu gagal juga...
tapi kamu bisa install aircrack juga di ubuntu, tapi dengan cara install tools backtrack 4 di ubuntu..
banyak tuh tutorialnya di google gan.....
tapi selalu gagal juga...
tapi kamu bisa install aircrack juga di ubuntu, tapi dengan cara install tools backtrack 4 di ubuntu..
banyak tuh tutorialnya di google gan.....
coba cari di synaptic dengan kata kunci aircrack-ng.
saya install diubuntu karmic bisa koq.
saya install diubuntu karmic bisa koq.
- sinux3r
- Contact:
- go3x
- Contact:
Masalah mulai muncul;
Reading package lists... Done
Building dependency tree
Reading state information... Done
E: Unable to locate package aircrack-ng
Reading package lists... Done
Building dependency tree
Reading state information... Done
E: Unable to locate package aircrack-ng
- go3x
- Contact:
trus, muncul lagi;
stall aircrack-ng
Reading package lists... Done
Building dependency tree
Reading state information... Done
aircrack-ng is already the newest version.
0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
ada yang tau artinya...
stall aircrack-ng
Reading package lists... Done
Building dependency tree
Reading state information... Done
aircrack-ng is already the newest version.
0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
ada yang tau artinya...
- go3x
- Contact:
trus waktu aku jalanin, muncul;
Aircrack-ng 1.1 r1738 - (C) 2006, 2007, 2008, 2009 Thomas d'Otreppe
Original work: Christophe Devine
http://www.aircrack-ng.org
usage: aircrack-ng [options]
Common options:
-a : force attack mode (1/WEP, 2/WPA-PSK)
-e : target selection: network identifier
-b : target selection: access point's MAC
-p : # of CPU to use (default: all CPUs)
-q : enable quiet mode (no status output)
-C : merge the given APs to a virtual one
-l : write key to file
Static WEP cracking options:
-c : search alpha-numeric characters only
-t : search binary coded decimal chr only
-h : search the numeric key for Fritz!BOX
-d : use masking of the key (A1:XX:CF:YY)
-m : MAC address to filter usable packets
-n : WEP key length : 64/128/152/256/512
-i : WEP key index (1 to 4), default: any
-f : bruteforce fudge factor, default: 2
-k : disable one attack method (1 to 17)
-x or -x0 : disable bruteforce for last keybytes
-x1 : last keybyte bruteforcing (default)
-x2 : enable last 2 keybytes bruteforcing
-y : experimental single bruteforce mode
-K : use only old KoreK attacks (pre-PTW)
-s : show the key in ASCII while cracking
-M : specify maximum number of IVs to use
-D : WEP decloak, skips broken keystreams
-P : PTW debug: 1: disable Klein, 2: PTW
-1 : run only 1 try to crack key with PTW
WEP and WPA-PSK cracking options:
-w : path to wordlist(s) filename(s)
-r : path to airolib-ng database
(Cannot be used with -w)
--help : Displays this usage screen
No file to crack specified.
ada yang punya solusi?
Waktu dijalanin ada 2 biji SSID online.. ko ga muncul yow?
Aircrack-ng 1.1 r1738 - (C) 2006, 2007, 2008, 2009 Thomas d'Otreppe
Original work: Christophe Devine
http://www.aircrack-ng.org
usage: aircrack-ng [options]
Common options:
-a : force attack mode (1/WEP, 2/WPA-PSK)
-e : target selection: network identifier
-b : target selection: access point's MAC
-p : # of CPU to use (default: all CPUs)
-q : enable quiet mode (no status output)
-C : merge the given APs to a virtual one
-l : write key to file
Static WEP cracking options:
-c : search alpha-numeric characters only
-t : search binary coded decimal chr only
-h : search the numeric key for Fritz!BOX
-d : use masking of the key (A1:XX:CF:YY)
-m : MAC address to filter usable packets
-n : WEP key length : 64/128/152/256/512
-i : WEP key index (1 to 4), default: any
-f : bruteforce fudge factor, default: 2
-k : disable one attack method (1 to 17)
-x or -x0 : disable bruteforce for last keybytes
-x1 : last keybyte bruteforcing (default)
-x2 : enable last 2 keybytes bruteforcing
-y : experimental single bruteforce mode
-K : use only old KoreK attacks (pre-PTW)
-s : show the key in ASCII while cracking
-M : specify maximum number of IVs to use
-D : WEP decloak, skips broken keystreams
-P : PTW debug: 1: disable Klein, 2: PTW
-1 : run only 1 try to crack key with PTW
WEP and WPA-PSK cracking options:
-w : path to wordlist(s) filename(s)
-r : path to airolib-ng database
(Cannot be used with -w)
--help : Displays this usage screen
No file to crack specified.
ada yang punya solusi?
Waktu dijalanin ada 2 biji SSID online.. ko ga muncul yow?
Who is online
Users browsing this forum: No registered users and 39 guests