To connect my Intel 2200BG card to a WEP encrypted, shared authentication infrastructure network with ssid test, and WEP key 12345, the command is “ WirelessUtils 2200BG setssid test IS -wep enable -auth share -key 12345“.
The command is “ WirelessUtils setssid -wep -auth -key “. You can use wirelessutils provided with this package to connect to a network.
Set Wireless Zero Configuration Service (WZC) in manual mode, stop it using “ net stop wzcsvc” and disable other wireless adapter utilities.WirelessUtils.exe: This provides a command-line routine to connect to a wireless network.VirtualWiFihelper.exe: This is a utility file for checking the correctness of VirtualWiFi.VirtualWiFiSvc.exe: This is the file corresponding to the VirtualWiFi Service.
You should have administrative rights to install drivers and services on your machine.Now, to test if these cards are able to inject packets do the following commands. If you did not set the channel, the packet injection test may fail as shown below. Put the USB adapters in the same channel as your test access points iwconfig wlan0mon channel iwconfig wlan1mon channel 1 Phy1 wlan1mon rt2800usb Ralink Technology, Corp. (mac80211 station mode vif disabled for wlan1)Īnd then verify if they are in monitor mode. (mac80211 monitor mode vif enabled for wlan1 on wlan1mon) Phy0 wlan0mon rt2800usb Ralink Technology, Corp. Phy1 wlan1 rt2800usb Ralink Technology, airmon-ng start wlan1 (mac80211 station mode vif disabled for wlan0) (mac80211 monitor mode vif enabled for wlan0 on wlan0mon) If airodump-ng, aireplay-ng or airtun-ng stops working afterĪ short period of time, you may want to kill (some of) them!
Put these USB adapters into monitor mode airmon-ng start wlan0įound 4 processes that could cause trouble. Phy1 wlan1 rt2800usb Ralink Technology, Corp. Phy0 wlan0 rt2800usb Ralink Technology, Corp. Virtual Mouseīus 001 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root test if the USB adapters are able to do a packet injection, do the following: Virtual USB Hubīus 001 Device 002: ID 0e0f:0003 VMware, Inc. RT5370 Wireless Adapterīus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hubīus 001 Device 003: ID 0e0f:0002 VMware, Inc. Bus 002 Device 002: ID 148f:5370 Ralink Technology, Corp. lsusbīus 002 Device 003: ID 148f:5372 Ralink Technology, Corp. Once I plugged them in, Kali recognized both adapters right out of the box. I got the PAU03 for $9.99 and the PAU05 for $15.99.Īnyways, I need to know if these adapters are compatible with Kali Linux. I did purchase an Alfa USB adapter, but it is too bulky, so I got me some Panda PAU03 and PAU05 low profile USB wireless card. I also pickup two USB wireless adapters for my wireless testing in my lab. I downloaded Kali Linux yesterday to learn Linux and some security stuff.