Wireless Security
Re: Re: AirPcap : Basic questions Jul 09 2009 04:06AM
Fatah al Farihin (fathkay yahoo com)

Here is the list from the non-n airpcap driver file

%DESCRIPTION_CLASSIC% = DriverInstall, USB\VID_CACE&PID_0001
%DESCRIPTION_CLASSIC% = DriverInstall, USB\VID_CACE&PID_0002
%DESCRIPTION_TX% = DriverInstall, USB\VID_CACE&PID_0101
%DESCRIPTION_TX% = DriverInstall, USB\VID_CACE&PID_0102
%DESCRIPTION_EX% = DriverInstall, USB\VID_CACE&PID_0200
%DESCRIPTION_NX% = DriverInstall, USB\VID_CACE&PID_0300

and the tools which you can change the vid/pid

http://wifi.openschemes.com/files/LibUSB_Drivers.rar
http://wifi.openschemes.com/files/Winmemtool.rar

--- On Thu, 7/9/09, Jon Janego <jonjanego (at) gmail (dot) com [email concealed]> wrote:

> From: Jon Janego <jonjanego (at) gmail (dot) com [email concealed]>
> Subject: Re: Re: AirPcap : Basic questions
> To: wifisec (at) securityfocus (dot) com [email concealed]
> Date: Thursday, July 9, 2009, 5:38 AM
> Good find.  I had that info
> somewhere but couldn't find it.
>
> Modifying the zd1211rw drivers is very straightforward, the
> VID/PID
> just needs to be added to the initial struct that contains
> valid codes
> for the devices.  Recompile and hopefully it works.
>
> But in my experience, it worked, picking it up as a wlan
> card, but
> still wouldn't support injection.  So there's gotta be
> something else
> to do.
>
> On Wed, Jul 8, 2009 at 9:48 AM, <info (at) netsentinc (dot) com [email concealed]>
> wrote:
> > VID/PID is 0xcace/0x0102 for the AirPCAP TX adapter.
> >
> > Specifically,
> > Windows reports:
> USB\Vid_cace&Pid_0102&Rev_4810
> > Linux reports: idVendor=0xcace, idProduct=0x0102
> >
> > I'll send an email to Josh Wright and see if he has
> any information he can readily send about what he did to get
> this working with the SANS backtrack distro...
> >
> > www.netsentinc.com
> >
>

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus