• Networking
  • USB wireless adapter for backtrack 5 r3?

I download the 64-bit iso last night and ran it today on vmware, but I couldn't get it to read my laptop's internal wifi adapter. So I googled around and found out that I'll need to get a usb wifi adapter for it to work. PC and Parts don't seem to have any of these adapters.

Do you guys recommend another adapter that will work? And has anyone tried cracking WEP and WPA keys with backtrack 5 r3?
yes i think they deliver, you might find it cheaper somewhere else though (maybe cheaper by 5- 10$), but still it costs a bit.
I have the deluxe edition (bought it from there), and i have tried using dictionary attacks on BT5 R3.

Good luck.
get any Chinese adapter .. they go for 20$ and since they have the older but good chips inside they are mostly plug and play
NAM wroteget any Chinese adapter .. they go for 20$ and since they have the older but good chips inside they are mostly plug and play
Just checked PC and Parts, I found this Dlink DWA-123 USB Wireless Lan Adapter 150MB/s for 11$. I googled around, but couldn't find a definitive answer. Do you think it will work?
alfa adapters are the most used , especially for a newbie ( easy to use with high bandwidth and range ) it is a bit bulky though . ( CEH and ISFS )
Turns out the Dlink DWA-125 is supported, but not the 123. It's 14$ and way cheaper than the 50$ alpha; I'm going to order it right now.

I'll keep you guys updated if I crack any keys. Thanks for the help!
cracking WPA is almost impossible no one ever uses English words. its almost always a combination of numbers symbols and Lebanese in English letters. good luck anyway
WEP on the other hand is very easy, you can crack the hardest of keys in few minutes.
couple years ago i managed to do it on windows which was actually impossible because of limitations in widows Kernel and drivers aren't readily available for windows injection.. but nowadays i noticed some other people managed to do it also on windows lots of tutorials popped up recently although haven't tried their method.
backtrack is always the easy way to go, but technically the only crackable keys are WEP
I'm doing it out of curiosity to be honest, but that doesn't mean I don't have a couple of WEP signals reaching my house I've been dying to crack. As for WPA I read somewhere that it's crackable if WPS is enabled.
random-username wroteI'm doing it out of curiosity to be honest, but that doesn't mean I don't have a couple of WEP signals reaching my house I've been dying to crack. As for WPA I read somewhere that it's crackable if WPS is enabled.
everything that has a bruteforce aspect to it is BS in my opinion.give it a shot and report back the results.
@random-username

if i remember well, you can crack even WPA2, IF the pass-phrase is a dictionary based word.
I booted Backtrack from USB and skipped the whole vmware charade. But I have a problem, when I type airodum-ng --bssid XX:XX:XX:XX:XX:XX -c (channel) -w (filename) mon0 they #Data column doesn't change and stays 0.

Then I try to continue and type aireplay-ng -1 0 -e (essid) -a XX:XX:XX:XX:XX:XX mon0 and the Association is a successful.

Then I type aireplay-ng -3 -b XX:XX:XX:XX:XX:XX mon0 and it begins reading the packets, but gets 0 ARP requests and 0 acks and doesn't send any packets.

I'm following this guide on an Acer Aspire E laptop.

Any guidance?

Note: When I type airmon-ng (Interface= wlan0 Chipset=Unknown Driver=brcmsmac - [phy0]

Could it be that the chipset is not supported?