I installed this program on my computer ... then I uninstalled it but now my wireless only detects the wifi signals when I have the program installed but when I uninstall it I cannot activate the wire...
Just install "CommView for WiFi" as demo software, and replace your card wifi driver with modded CommView driver, that don't have mac restriction (ProgramFiles(X86)\CommViewWiFi\Driver). Then you can uninstall the demo.
Now we successfully captured and save the 4-way handshake to cap File
This File is essential to find wifi password using aircrak
The method of finding wifi password using aircrack is explained in another post
taiwebs.com is a website to download applications, tips, software: windows, android, ios, webs diversity to everyone is completely free. We always strive to bring the best products to our users. Hope everyone will like and support the Website to grow.
when I start sniffing my wlan with wireshark, I noticed my AP send probes requests to a Proxim Wireless device who change his 6 last mac address number each time I start a session. Does I have to worry about that? Why a device change his mac address each time I put my wifi adapter in promiscuous mode? What can I do to get more information about this device?
I don't think there are other Proxim Wireless device in my area, I see only one Proxim device when I perform the packet capture. Each time I start wireshark or commview the 6 last mac address numbers are changed. I tested a capture a complete day without restarting wireshark, the Proxim device kept his mac address, next day I restarted 10 times wireshark and got 10 differents mac address from Proxim device. I don't understand why the device change his mac address when I perform a new capture.
I just noticed that the active node discovery function is enabled in commview for WiFi. This function makes the application send PROBE REQUEST packets periodically. Such packets facilitate the discovery of those APs that do not broadcast their SSID. When I disable the active node discovery, sending probe request from Proxim device disapear in packet capture. I have tested using together, wireshark with another WiFi adapter and commview with active node enabled. Wireshark see proxim device as STA as soon I enable the function and disapear the same way.
It's not easy. On Windows you can use an old Microsoft program called Microsoft network monitor.cellstream articleYou can save the file and open in wireshark.You need a wifi adapter that supports monitor mode - some do not, or not under Windows anyway.If your wifi traffic is encrypted I recommend you turn off encryption - make it an open network, while you capture messages. Otherwise, for Linux see this -- and this
I'm trying to crack my wifi (WPA-CCMP) password to test its strength and security, I'm using the commview for wifi and aircrack-ng software on windows 10. I've three laptops, Windows 10 (64bit) with dual boot ubuntu 18.04, only Windows 10(64bit), Windows 7(32bit), with Qualcomm Atheros QCA61x4A Wireless, Intel(R) Dual Band Wireless-AC 3165, Realtek RTL8191SE Wireless LAN 802.11n PCI-E NIC network adapters respectively. after some googling, I found that unfortunately, the first two don't support packet injection (am I right?). I couldn't find anything on the third i.e Realtek one, does it support packet injection? is it possible to capture the 4-way handshake without packet injection?
I tried using Realtek RTL8191SE Wireless LAN 802.11n PCI-E NIC network adapter but after capturing around 5000 packets in the tcp-dump format in commview for wifi application and pass it to aircrack-ng, I get an error saying "Packets contained no EAPOL data; unable to process this AP"