http://www.chris-mohan.com/2010/03/wifu-aireplay-ng-ska-attack-problem-with-linksys-wap54g/
http://trac.aircrack-ng.org/ticket/372
http://trac.aircrack-ng.org/ticket/703
http://www.backtrack-linux.org/forums/backtrack-5-experts-section/44327-wifi-ap-wrt45gl-linksys-cisco-broken-ska.html
http://forum.aircrack-ng.org
/index.php?PHPSESSID=dd18de1ba952d186cf749d7760f2643e&topic=233;prev_next=next
Of course, cracking WEP by bypassing SKA was one the last steps of the course. However, I have another access point that I could use: Dlink-655. I setup the new access point with the same ESSID and the same
Anyway, the only thing left in the lab is cracking WPA networks with the dictionary/custom wordlists. That should be fine. I also want to use a collaboration of cewl, crunch and the wordlists from Backtrack 5 R1 to use in the field. I wonder what kind of results I would get during a security assessment.
Before I forget, if people are having trouble using profile variables to make the commands shorter, I used the ".bashrc" file. The /etc/profile was not working for me like the videos illustrated. I just figured it was my fault since I am using Backtrack 5 R1. Fortunately, I was able to use the variable $ESSID by adding to the file ".bashrc" for example:
export ESSID=oswpexam