Back to list
Re: Re: AirPcap : Basic questions
Jul 09 2009 04:06AM
Fatah al Farihin (fathkay yahoo com)
Here is the list from the non-n airpcap driver file
%DESCRIPTION_CLASSIC% = DriverInstall, USB\VID_CACE&PID_0001
%DESCRIPTION_CLASSIC% = DriverInstall, USB\VID_CACE&PID_0002
%DESCRIPTION_TX% = DriverInstall, USB\VID_CACE&PID_0101
%DESCRIPTION_TX% = DriverInstall, USB\VID_CACE&PID_0102
%DESCRIPTION_EX% = DriverInstall, USB\VID_CACE&PID_0200
%DESCRIPTION_NX% = DriverInstall, USB\VID_CACE&PID_0300
and the tools which you can change the vid/pid
--- On Thu, 7/9/09, Jon Janego <jonjanego (at) gmail (dot) com [email concealed]> wrote:
> From: Jon Janego <jonjanego (at) gmail (dot) com [email concealed]>
> Subject: Re: Re: AirPcap : Basic questions
> To: wifisec (at) securityfocus (dot) com [email concealed]
> Date: Thursday, July 9, 2009, 5:38 AM
> Good find. I had that info
> somewhere but couldn't find it.
> Modifying the zd1211rw drivers is very straightforward, the
> just needs to be added to the initial struct that contains
> valid codes
> for the devices. Recompile and hopefully it works.
> But in my experience, it worked, picking it up as a wlan
> card, but
> still wouldn't support injection. So there's gotta be
> something else
> to do.
> On Wed, Jul 8, 2009 at 9:48 AM, <info (at) netsentinc (dot) com [email concealed]>
> > VID/PID is 0xcace/0x0102 for the AirPCAP TX adapter.
> > Specifically,
> > Windows reports:
> > Linux reports: idVendor=0xcace, idProduct=0x0102
> > I'll send an email to Josh Wright and see if he has
> any information he can readily send about what he did to get
> this working with the SANS backtrack distro...
> > www.netsentinc.com
[ reply ]
Copyright 2010, SecurityFocus