Try scan with the "ignore frame checksums error" box checked, I got reports about doing that way it works but I can't assure it, since i'm not a NHR (or any RTL8188RU Device) owner...
I have the same issue. My RTL8187L shows connected and in monitor mode but finds 0 APs. Tried connect/disconnect, unplug & plug card several times but nothing. When I try 0.4.4 it works fine. 0.4.5 is a dud for me.
inflator doesnt work? using inflator, no ap found but using minidwep found. im new here, i used old version of xiaopan. when i tired scan using inflator, only few wifi using wpa/wpa2 detected. but actually there's more. im using RT8187L chipset.
got problem.. both wep & wpa crack fail.. using Alfa NHR use Alfa NEH got to unplug the usb many times to detect AP
inflator doesnt work found 0 ap. feedingbottle finds more ap than minidwep-gtk.All xiopan versions result is the same.I wonder why ? for example : feedingbottle 25-30 ap finds , minidwep 10-15 ap finds. im using alfa nha AR9271 chipset.
Here is a pdf screen shot. Sorry i miss typed it was supose to say 16 seconds/pin on my older post.. but it is still screaming fast compaired to reaver pro in vmware. 144seconds/pin for reaver pro....
Quick screenshots of the wps issue under 0.4.5, I used the built-in ipw2200 but the wireless adapter makes no difference. The last 2 networks in both screenshots are the same and WPS-enabled. 0.4.4 0.4.5
I thank A Lot the staff for providing us such great softwares and i encourage them to continue and do their best!! --- Double Post Merged, 19 Feb 2013 --- please deactivate my account
OOO Boy... Now this will bee fun! I also have a request Title: Wifite v2.0 To attack multiple WEP, WPA, and WPS encrypted networks in a row. This tool is customizable to be automated with only a few arguments. Wifite aims to be the "set it and forget it" wireless auditing tool. features sorts targets by signal strength (in dB); cracks closest access points first automatically de-authenticates clients of hidden networks to reveal SSIDs numerous filters to specify exactly what to attack (wep/wpa/both, above certain signal strengths, channels, etc) customizable settings (timeouts, packets/sec, etc) "anonymous" feature; changes MAC to a random address before attacking, then changes back when attacks are complete all captured WPA handshakes are backed up to wifite.py's current directory smart WPA de-authentication; cycles between all clients and broadcast deauths stop any attack with Ctrl+C, with options to continue, move onto next target, skip to cracking, or exit displays session summary at exit; shows any cracked keys all passwords saved to cracked.txt built-in updater: ./wifite.py -upgrade screenshots successful WEP attack (after 90 seconds): successful WPS attacks (after 17 hours): Please rate my postings.
Hello, I am trying out Xiaopan for the first time, but I am not new to sec stuff. I was wondering what the default password to the .zip file I downloaded Xiaopan in? Or do I have to crack it myself? NVM, got it myself. Thanks.
same here... xiopan 0.4.3 shows my ap and others ap with wps but 0.4.5 doesnt show wps. funny.. Use Fantasma's Live USB tutorial and make with the latest LiLi
im facing a problem. I see the Xiaopan Have also problem when is burned to CD is not starting need to fix that problems ...