If you just want to monitor the other wireless clients, you don't need a particular adapter as any adapter can sniff the wireless signals over the air. However, if you want to inject specially crafted packets (such as WEP cracking), you need to have an adapter that can support injection. If you want to test your wireless adapter if it supports injection or not, you can use the aireplay-ng which is part of the aircrack-ng suite of tools.
The AirPcap family is an open, affordable and easy-to-deploy wireless packet capture solution for MS Windows environments. With Acrylic WiFi we have developed an NDIS driver that allows capturing WiFi traffic on Windows natively with most WiFi cards of the market and we have developed on it a new library that replaces the original Airpcap.dll library.
The command to test a basic injection is: aireplay-ng -9 wlan0 Microsoft Windows has only a single Adapter that supports raw packet injection which is the Airpcap adapter. If you plan to use a Linux distribution such as BackTrack or Kali, any modern wireless adapter is capable of injecting raw packets.
You can find further details about the injection test procedure at. You cannot use VMWare or any other virtualized environment since it will mount the wireless adapter as Ethernet device which can't sniff or inject into the wireless network. Do i need to have a Airpcap adapter to monitor all the packets from my router or is there any alternative? For Wireshark, or any other application that uses WinPcap to capture traffic, you need an AirPcap adapter. For, you won't need (and can't use) an AirPcap adapter; however, you will need Windows Vista or later, and an adapter that supports 'Native Wi-Fi' (I don't know how to determine whether your laptop's adapter does other than downloading Network Monitor and installing it and trying it).
Some vendors of competing network analyzers that provide their own drivers for Wi-Fi adapters say that 'Native Wi-Fi', for capturing in 'monitor mode', doesn't work very well for some adapters.
Does it have to be AirPcap? I think you mean Promiscuous mode, as you should be able to do promiscuous mode on most cards by default. I have it on a USB drive and it works fine off of it. Cain and Able just allow you do do MITM attacks, so as long as you are already on the access point, you use Cain to do the MITM attack and something like Wireshark to grab all the packets to search for things like passwords, etc, but should work with your card in promiscuous mode. Passive or Promiscuous mode? Uploader: Date Added: 7 June 2005 File Size: 13.13 Mb Operating Systems: Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X Downloads: 19552 Price: Free.Free Regsitration Required Posted August 28, I think you mean Promiscuous mode, as you should be able to do promiscuous mode on most cards by default.
By RogueCitizenAugust 28, in Security. Does it have to be AirPcap? – Security – Hak5 Forums I’m going to look into a suitable Linux distro for what I need to do.
Most wireless adapters restrict access either in drivers or firmware to the ‘lower’ network layers which you need access to do things like ARP spoof attacks and the cain and abel airpcap. You would need to check a linux HCL for the distro you use to see if it can do what you want. Go To Topic Listing Security. I just want to clarify that the main reason for the airPcap adapter is it in a way ‘guarantees’ access to the physical layer of the adapter from what I understand.
Configuring Cain to Sniff Passwords on Wireless LAN Adapter Or does it absolutely have to be a AirPcap adapter? I know i had a portable version of cain and able and all i did was copy the dll’s into cainn root directory and it worked. I have it on a Cain and abel airpcap drive and it works fine off of it.
You probably are wanting to do Ael mode though, which is where AirPcap comes in to play for windows. Does it have to be AirPcap? Atheros works great for backtrack. Cain and Able just allow you do do MITM attacks, so as long as you are already on the access point, you use Cain to do the MITM attack and something like Wireshark to grab all the packets to search for things like passwords, etc, but should work with your card in promiscuous mode. Sorry if this was already a topic I didn’t have time to search the forums my flight is boarding.
I can’t remember cain and abel airpcap the files it creates but that is what I remember doing to get it to work off the drive. Most distro sites cain and abel airpcap info on what hardware was tested and has drivers for stuff. Posted September 14, Share this post Link to post Share on other sites.
Even if a card is capable cain and abel airpcap monitor mode under linux, does not mean you can under windows as they do not have drivers written for windows to do this the same way you can in linux. Passive or Promiscuous mode? Thank you very much digip, That was pretty much everything I needed to know for the time being. Posted September 6, cani Just have to copy any DLL files it creates outside of its folder to its base folder when moving the files to a flash drive. Posted September cain and abel airpcap, Sign In Sign Up.
![Abel Abel](https://support.metageek.com/hc/en-us/article_attachments/201527524/AirPcap_Driver_Page.png)
TROUBLESHOOTING: CAIN & ABEL Most cards should work with Netstumbler on Windows by default, as it doesn’t need to be in monitor mode to do it’s job of finding access points. AirPcap is the only card I have seen for windows that can do monitor mode by default, as it is its main purpose anyway.
Archived This topic is now archived and is closed to further replies. Posted August 29, As for things like Monitor mode and packet injection, windows doesn’t cain and abel airpcap monitor mode by default without an adapter cain and abel airpcap for it.