Dell Mini 10v Forum for all discussions and support on the Dell Mini 1011, also known as the Mini 10v. If your question is regarding Mac OS X, please use the Mini 10v Mac OS X forum . The easiest way for me to get this across is by just describing my experience with getting XP/OSX/LINUX/Backtrack/AIRCRACK support with a built in wireless card. Bear with me since I'm very long winded but I wanted to cover everything I know now about support for all the solutions I tried. Simply put, I would highly suggest getting a broadcom chip (i.e. from dell) if you want to triple boot linux, osx, and windows with injection capability in aircrack on linux. Why? Well sit down and let me tell you my story about getting the right wireless card. But first, a summary. Summary: I tried EXTREMELY THOROUGHLY the built-in broadcom 4312 low power, a belkin rt73 usb dongle and a linksys wusb54gc usb dongle from best buy, a gigabyte atheros internal wireless card, looked into both the intel 3945abg and 4965agn and finally a dell broadcom 4311 card. What follows is everything you need to know about these cards, presented as my experience trying them out. The stock broadcom chip in the mini 9 is a broadcom 4312 and works out of the box with osx, windows and linux but guess what? It isn't supported for the b43 driver under linux (a great, if not the BEST monitor/injection driver post-patches for ANY wireless card under linux) because it's a "low power version". So even though you can put it in passive (monitor) mode under kismac because it's seen as an airport extreme card, don't expect this one to ever be supported for injection in linux. So if you read the aircrack-ng wiki, there's a great article on the best injection-capable wireless card to buy. The gist of it is that atheros internal cards are generally the best cards to get (usb atheros will never be supported) and they use either madwifi or the newer, better ath5k drivers. Right under that, however, they also give mention to the recent versions of the b43 driver for the broadcom "airforce" cards (i.e. 4301 to 4309, 4310 to 4319 BUT excluding our crappy low power 4312 and wireless-n and usb). They even say that lately b43 has been as good as or even outperforming atheros cards. Now my first option that I tried was keeping the built in card, and going to best buy to get a belkin F5D7050 dongle that has an rt73 chipset. This was an ok alternative, especially since i wouldn't always need injection capability and it was supported in kismac too, but I ran into a much more severe problem with this dongle. Although I could easily connect to my test router and crack its encryption with the belkin, I had to try to use it at the beach before I realized the range on this dongle is a pile of donkey crap. While my built in broadcom was picking up 6-10 signals in kismac from condos around the room I stayed in, and around 730 unique signals driving down the main road, the belkin picked up probably a grand total of 10 or so when driving in the car and absolutely zero in my room. This was amazingly bad and it went back to the store ASAP. So back at best buy, I picked up a neat looking linksys dongle called the wusb54gc after reading that most versions worked nicely in linux and kismac. Well, as it turns out, linksys is now making the crappiest dongle they could come up with, as the only freakin use this ever got me was windows asking me for its drivers which I didnt bother to install because I didnt buy the dongle just to give me internet access. Kismac completely didnt work with this dongle and linux support was somehow completely absent. So anyways, I now wanted an internal version of what I said before, something that would give me internet access in osx, windows and linux while also being able to inject packets and monitor with my 9.04 ubuntu netbook remix. So, being naive, and thinking I wanted to try out an atheros card since I had more than enough experience with broadcom, I got a gigabyte gn-ws50g-rh for about 35 bucks after shipping. It apparently uses a 242x atheros chip and I saw at several insanelymac threads that people were able to get 168c:001c cards to work by some means in OSX. Anyways it turns out it was a bad choice. Whether or not I could EVER get it to work doesn't really matter, I tried about 10 different ways and read every thread about it I could find, spent way too many wasted hours but could not for the life of me get it to work in OSX. Now, it did work out of the box with ubuntu and injected nicely with no patches necessary for the automatically provided ath5k driver. It also had some of the best drivers and software for use with windows, it even allowed me to adjust the transmit power and got an amazing 5-bar 54mbps signal in an area where I would normally with other cards get about 2 bars and a fluctuating mbps rate. So at that point, it worked great in windows, but I had a bad taste in my mouth because even though it injected in linux, it got a normal signal, like every other card I've used, whereas in windows I could set the transmit power to get a great signal. Not to mention it has a distinct squeaky sound when injecting or monitoring so I doubt the hardware is all wonderful. So I'm looking around for a different card to buy, and I come across the intel 3945abg and 4965agn, and I was about to buy one of them because there is a 3rd party driver available that treats it as an ethernet connection and there is also a linux driver called iwlagn that has injection support, but I realized a key thing: the osx driver that is available apparently doesn't work for either card and even if it one day would work, it wouldnt be possible to use it as an airport card in kismac for gps wardriving. So that's out of the question for a replacement card. Finally, I decided to see how the stock wireless card in my old inspiron e1505 worked. I had previously not bothered to try it because I read on the backtrack hcl that injection seemed to work but was really slow and my own tests seemed to never work very well. But then I realized that all b43 cards apparently need a mac80211 patch to speed up injection. I also tried following a well written guide on how to install a wireless testing kernel but that took a long time and didnt seem to be much faster than just patching the few drivers in a fresh ubuntu 9.04 install. And apparently all these broadcom cards are all natively supported in fresh installs of mac osx, so this worked out great. So after all this, I now have my unused "dell wireless 1390 mini card" in my mini, dual booting windows and osx with OOB internet on my 8gb SSD, with airport extreme passive mode on kismac working (no injection), with a fresh ubuntu 9.04 netbook remix installed on an 8gb sdhc card in the sd slot that can run kismet in monitor mode and inject packets using whatever aireplay attack desired. And it's fast, too...I cracked my test router running the latest dd-wrt and 128 bit WEP encryption in 170 seconds using an auto script I downloaded from the aircrack forums. Wow...nice write up and the winner is the Dell Wireless 1390...who woulda thunk!? BTW: Have been using WPA2 Personal AES security mode on my router flashed w/DD-WRT...am I still safe from you guys? http://accessories.us.dell.com/sna/prod ... u=430-2509 Have you tried the Dell Wireless 1490 WLAN in your tests yet? From what I understand its the same Broadcom chipset as the 1390 but also includes support for 802.11a 5GHz channels... Originally Posted by somms Wow...nice write up and the winner is the Dell Wireless 1390...who woulda thunk!? BTW: Have been using WPA2 Personal AES security mode on my router flashed w/DD-WRT...am I still safe from you guys? http://accessories.us.dell.com/sna/prod ... u=430-2509 Have you tried the Dell Wireless 1490 WLAN in your tests yet? From what I understand its the same Broadcom chipset as the 1390 but also includes support for 802.11a 5GHz channels... like zion said, wpa is secure from this type of attack, lemme tell you the only thing that's unsafe about wpa/wpa2 however. lets say you choose your password to be doggy. You think this might be safe enough, right? Well not so much. You see, doggy might be safe enough for using as a password to like hotmail or gmail or something, but the thing with wpa/wpa2 encryption is that all that's needed is packets called a handshake that can be sniffed anytime you connect to your router. You might then think its still kinda safe because you dont manually connect to the router all that much, but an attack can be launched that deauthenticates you and makes your computer automatically reconnect, giving away that packet. So anyway, as soon as that handshake is collected, however it may be, you can just sit there and run a dictionary attack to find out any one word passwords. So doggy, being an english word would be found easily since you can go through about 300 words per second (in my experience, faster depending on computer). Now don't go off thinking a phrase or doggy7 or doggy123 is really ALL that safe, I actually have a dictionary that when you look at it's contents it has things as rare as yohohoandabottleofrum as something it will check for. Given enough time and commitment, someone can and maybe will crack your WPA encryption. OK so enough FUD, the simple solution is to just bite the bullet and do one of those random crazy passwords, and you'll be safe from any hacking enthusiasts. Something along the lines of e4FB61iTy7g won't be cracked any time soon if you're worried about your shared folders. I'll tell ya one thing though, nobody will ever learn. I drove through the main street of a local beach the other day and found about 700 access points, 20% unencrypted, 60% with some hilarious WEP and about another 20% actually using WPA, most of which were probably one word passwords. I don't use hybernation. However I remember I read somewhere Linux uses the swap partition to hybernate. May be you need to increment it to at least your RAM size. If you put /boot and swap on SSD and not in SDHC you shouldn't have problems Is there a way to get monitor mode and injection in kismac? I also have an e1505 with the Dell 1390, as well as a mini 9. I don't want to have to install Linux again if I don't have to. Right now, I have a dual boot Windows 7/ Leopard mini 9. I found an old router that doesn't work anymore to share internet from a cable modem, but can work just for local networking. I'd like to try cracking it. I also downloaded Backtrack 4, but wasn't able to get the WiFi on. The light on my E1505 never went on, even though I had shut down from OS X with WiFi on. Red Mini 9 - 2 GB Mushkin RAM, 32 GB Super Talent, 1.3 MP Camera, Snow Leopard 10.6 Inspiron E1505 1.6 Ghz Core Duo, 1 GB RAM, Intel GMA 950, 80 GB HDD, Leopard 10.5.8 Help me with Dropbox, please: https://www.getdropbox.com/referrals/NTE2ODgzMzE5
Upgrading the Wireless, XP/OSX/LINUX/BT4/AIRCRACK support!
Dell Wireless 1390 Aircrack Download
- Upgrading the Wireless, XP/OSX/LINUX/BT4/AIRCRACK support! - 05-09-2009. So after all this, I now have my unused 'dell wireless 1390 mini card' in my mini.
- I have Dell Inspiron 1501 notebook with Dell Wireless Card 1390 (Broadcom chipset. -is my wireless card compatible with AirCrack, and will I be able to run this.
- I'm trying to get airsnort and airopeek to work under vista on a dell vostro 1500 with a dell 1390. be using AirCrack. Wireless card for dell.
- [分享]Dell Wireless 1390 WLAN Mini-PCI(BCM94311\BCM4311)bt3破WEP-中国无线论坛,无线论坛,wifi.
Hi matrox, In order to use the Dell 1390 wireless card with Linux, try to download the driver from the link mentioned below. Unfortunately, there is no native support.