This forum is in archive mode. You will not be able to post new content.

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - meareiguana

Pages: [1]
1
The AP that I'm trying to hack does not have WPS enabled and secondly, I don't use kali linux - I stated that quite clearly. Wifi hacking is my only point of interest and so far windows has done the job for me. Yes, I'm well-aware of its limitations and if I don't succeed with the current method, I might invest some time into learning basic linux.

i always disable sharing, of course. Have already googled about mac addresses, merely wondered if there is something else worth mentioning.

Thanks for the links, though!

2
Hey guys,
I probably should've posted this in the newbie section but oh well... Alright so, I'd been using a wep secured network up until few days ago when it got turned off for w/e reason so I was forced to find another victim in the building.
To begin with, I'm pretty limited with both hardware (a wifi adapter that doesn't support packet injection and software (win8). While capturing packets (passively, low signal strength, hella slow)  from a wep secured network,  I've accidentally captured a 4-way handshake. The encryption is WPA2-TKIP, if it means anyhing to you... Currently in the process of cracking it by using aircrack.(00000000-99999999 lst file). Using english dictionary is basically worthless in the country I live in so yeah,  I was hoping the pw would be as short as possible and that it would contain numbers only. Since ssid revealed the ISP as well as the router model, I called their customer service and tricked them into confirming that the default password is indeed 8 digits. - can only hope that it remained unchanged, otherwise I'm screwed, right? It would take ages to crack it. Oh and yeah WPS is disabled, too.
A question regarding 4-way handshakes - if i understood correctly, they can be captured only the first time a person enters the password on a wireless device, right? Otherwise I would've captured dozens by now, whenever a cell gets back into wifi range, heh.

After obtaining the password, my next goal is to stay anonymous so that I don't get noticed. Well, one would think that only an average user would leave the  default password, bur you never know who you're dealing with. Quite honestly I have no idea what can happen to my devices/datq when Im connected to someone else's network. Pretty much anything, I guess.
should i use a proxy/vpn, like hot-spot shield? Would it be ossible to hide (spoof) my mac address so it isn't visible when they log into router settings?
Is there something else you'd advise me to do? But please keep in mind that my level of expertise is pretty low. I'm willing to do some reading and educate myself, though.

Thanks in advance!

Pages: [1]


Want to be here? Contact Ande, Factionwars or Kulverstukas on the forum or at IRC.