Return-path: Received: from mail-yw0-f46.google.com ([209.85.213.46]:52915 "EHLO mail-yw0-f46.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752767Ab1J0XMs (ORCPT ); Thu, 27 Oct 2011 19:12:48 -0400 Received: by ywm3 with SMTP id 3so3121137ywm.19 for ; Thu, 27 Oct 2011 16:12:48 -0700 (PDT) Message-ID: <4EA9E56D.5080300@lwfinger.net> (sfid-20111028_011251_280577_1FBDC666) Date: Thu, 27 Oct 2011 18:12:45 -0500 From: Larry Finger MIME-Version: 1.0 To: =?ISO-8859-1?Q?G=E1bor_Stefanik?= CC: Roman Proud , linux-wireless@vger.kernel.org Subject: Re: RTL8188RU no injection? References: <4EA89B8D.7060104@lwfinger.net> <4EA97323.50004@lwfinger.net> In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Sender: linux-wireless-owner@vger.kernel.org List-ID: On 10/27/2011 05:00 PM, G?bor Stefanik wrote: > As a former Aircrack developer, I can definitely state that Aircrack > uses the same injection method as packetspammer. I just built Aircrack and tested it with rtl8192cu on an ALFA AWUS036NHR, which has the RTL8188RU chip. It works just as you expected. Larry