• Home
  • Hacking & Security
    • Network Hacking
    • Web Hacking
    • Social Engineering
    • Kali Linux
    Submit An Article
  • Courses
    • All Courses
    • Bundles
    • VIP Membership
    • FAQ

    Popular Courses

    Network Hacking Continued – Intermediate to Advanced

    Network Hacking Continued – Intermediate to Advanced

  • Shop
  • Competitions
  • Services
    Penetration Testing
    Consulting
    Code Review
    One on one Training
    Online Courses
    VPN
  • Blog
      • Cart

        0
    VIP Membership
    Got a question?
    [email protected]
    RegisterLogin
    zSecurityzSecurity
    • Home
    • Hacking & Security
      • Network Hacking
      • Web Hacking
      • Social Engineering
      • Kali Linux
      Submit An Article
    • Courses
      • All Courses
      • Bundles
      • VIP Membership
      • FAQ

      Popular Courses

      Network Hacking Continued – Intermediate to Advanced

      Network Hacking Continued – Intermediate to Advanced

    • Shop
    • Competitions
    • Services
      Penetration Testing
      Consulting
      Code Review
      One on one Training
      Online Courses
      VPN
    • Blog
        • Cart

          0

      April 2, 2020 at 9:23 am #32901
      AvatarJogi997
      Participant

      Hello Zaid, I am using your Kali image you provide on your website (actually link from udemy course) so I assume the drivers for AR8812AU should be fine. Especially if it is recognized correctly.
      I am able to change the MAC and to put it into monitor mode. However when I run airodump-ng I can see mainly clianets, 95% of them are not associated with any bssid. In the AP section above I see only 2 or 3 items which is defnitely too little. There is no useful information provided as well. Seems airodump-ng has problems to detect APs and their bssids. The problem occurs on AR8812AU, on another single band adapter from alfa it works ok. SOrry if this topic has been covered somewhere – I am unable to find it. Any help on that?

      CH 8 ][ Elapsed: 5 mins ][ 2020-04-02 04:02

      BSSID PWR Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID

      C8:D7:B0:CB:74:E5 -1 0 0 0 -1 -1 <length: 0>
      80:35:C1:79:39:25 -81 0 0 0 -1 -1 <length: 0>
      00:12:2A:73:20:18 -77 0 0 0 -1 -1 <length: 0>
      50:D4:F7:92:C9:DF -81 0 0 0 -1 -1 <length: 0>

      BSSID STATION PWR Rate Lost Frames Probe

      C8:D7:B0:CB:74:E5 D4:25:8B:B2:51:01 -45 0 – 1 0 31 AndroidAP
      (not associated) DA:A1:19:F5:FD:85 -43 0 – 1 0 10
      (not associated) 34:6B:46:FF:5E:A9 -53 0 – 1 0 28
      (not associated) 28:3A:4D:37:9F:35 -57 0 – 1 0 195
      (not associated) 02:2F:07:7C:45:CB -61 0 – 1 0 5
      (not associated) 0A:A6:FE:BC:74:DC -71 0 – 1 0 4
      (not associated) 4C:0F:6E:70:83:24 -59 0 – 1 78 31 NETIASPOT-8B8D90
      (not associated) 0C:2F:B0:68:AA:20 -73 0 – 1 0 2 NETIASPOT-732010
      (not associated) FE:0B:54:C0:3B:5A -73 0 – 1 0 7
      (not associated) 2A:81:BA:70:8C:0E -77 0 – 1 0 14 Hertwig_99_5G,ROLKRAK,Kaer Morhen,ALLTEAM_WAWA,WroPort-E,ROLX,Wifi Hotel Pinei
      (not associated) 46:9F:72:4D:29:7E -77 0 – 1 0 7
      (not associated) C0:EE:FB:C5:C8:89 -79 0 – 1 0 1
      (not associated) 4E:C3:AA:41:92:01 -79 0 – 1 0 4
      (not associated) 64:D1:54:90:04:18 -79 0 – 1 265 21 wlan_tramwaje
      (not associated) DA:A1:19:1E:52:50 -49 0 – 1 0 12
      (not associated) DA:A1:19:7E:3A:38 -57 0 – 1 0 9
      (not associated) DA:A1:19:D9:5F:D2 -73 0 – 1 0 5 nc+
      (not associated) 74:40:BB:63:61:C1 -81 0 – 1 0 3
      (not associated) E0:B6:55:03:05:5B -35 0 – 1 0 22 yogisub-5G,yogisub-5g
      (not associated) 6C:C7:EC:43:C0:3F -69 0 – 1 0 2
      (not associated) DA:A1:19:64:9D:14 -71 0 – 1 0 5
      (not associated) 4A:E8:BE:CA:82:4F -81 0 – 1 0 1
      (not associated) 2A:A1:0B:B2:46:7D -79 0 – 1 0 1
      (not associated) AE:DD:4C:05:DF:2E -79 0 – 1 0 1
      (not associated) 72:70:9E:35:AA:2B -79 0 – 1 0 2
      (not associated) DA:A1:19:4C:C4:75 -79 0 – 1 0 1
      (not associated) D0:04:01:2D:F2:8F -77 0 – 1 0 8
      00:12:2A:73:20:18 50:76:AF:1A:D2:A4 -77 0 – 1 0 9 NETIASPOT-732010

      Categories

      • Cryptography
      • Cryptography
      • CTF
      • Forensics
      • Hacking & Security
      • IOT
      • Kali Linux
      • Network Hacking
      • News
      • OSINT
      • Post Exploitation
      • Post Exploitation
      • Programming
      • Security
      • Social Engineering
      • Uncategorized
      • Web Hacking

      Popular Posts

      Got a Blank Screen After Importing Kali in Virtual Box ? Here’s How To Fix It
      25Jan2018
      How To Start a Fake Access Point (Fake WIFI)
      28Nov2019
      How to Discover Device Manufacturer Based on MAC Address
      28May2018
      HiddenEye – The All in One Phishing Solution
      28Apr2020

      Connect with us

      • Facebook
      • Twitter
      • LinkedIn
      • Instagram
      • Youtube

      “Everything related to ethical hacking

      & cyber security in one place.”

      Quick Links

      • Home
      • About Us
      • Hacking & Security
      • Contact
      • FAQ

      Services

      • Penetration Testing
      • Consulting
      • Code Review
      • One on one training
      • VPN
      • VIP Membership

      Company

      • About Us
      • Contact

      Support

      • FAQ
      • Forums

      Copyright © 2021 zSecurity Ltd. All rights reserved.

      • Privacy
      • Terms

      Contribute

      Share your knowledge with the world

      SUBMIT AN ARTICLE

      Login with your site account

      Lost your password?

      Not a member yet? Register now

      Register a new account

      Are you a member? Login now