Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Low sniffing rate using Alfa AWUS1900 and rtl8814au #2

Open
anatolyvenzekov opened this issue Feb 15, 2021 · 5 comments
Open

Low sniffing rate using Alfa AWUS1900 and rtl8814au #2

anatolyvenzekov opened this issue Feb 15, 2021 · 5 comments

Comments

@anatolyvenzekov
Copy link

Hi,

I am using rtl8814au driver both in Ubuntu 16.04 and 20.04 reaching monitor mode status and sniffing different wifi channels with no problem. The issue comes with the number of packets I can capture. I am completely sure that the surroundings have a great amount of wifi traffic, but with capture times of a minute I am only able to see dozens of packets.

Do you experience this behavior?? Is there any other configuration a part from the one to put the card in monitor mode?

Thanks in advance!

@n0ss
Copy link
Owner

n0ss commented Feb 15, 2021

Actually I think this depends on the software you are using, the type of attack (active/passive) and the actual attack (what are you trying to capture, how do you configure your command, etc). I don't think your issue is necessarily related to the driver itself. Without further details actually it could be a lot of things

@anatolyvenzekov
Copy link
Author

Thanks for the quick response @n0ss .

I am simply sniffing a wifi channel in monitor mode using tcpdump, which below uses pcap library. For that, I simply put card interface in monitor mode with the following commands:
$ sudo ip link set _interface_ down
$ sudo iw dev _interface_ set type monitor
$ sudo ip link set _interface_ up
$ iw dev _interface_ set channel 1

and finally I see the traffic captured with:
tcpdump -i interface -XX

Any idea?

@n0ss
Copy link
Owner

n0ss commented Feb 15, 2021

I suggest you look into hcxdumptools : https://github.com/ZerBea/hcxdumptool
https://github.com/ZerBea/hcxtools

They are the most up to date for targetting Wi-Fi vulns.
What are you currently trying to achieve ?

Also you could read this : https://hashcat.net/forum/thread-9639.html

@anatolyvenzekov
Copy link
Author

Simply I just want to sniff as much as WiFi packets as I can, in order to analyze then. I am doing the same with another card of Alfa, AWUS036AC (rtl8812au) and the result in number of packets sniffed is huge compared with AWUS1900.

@Steso871
Copy link

i also have low number of AP that my awus 1900 can se. My cheap rtl8812au can se many more

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants