This forum is in archive mode. You will not be able to post new content.

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - palipr

Pages: [1]
1
Hacking and Security / Re: Backtrack Wifi Cracking Problem
« on: June 05, 2012, 04:14:53 AM »

================================
thanks dude.. i am getting little bit you.. can u share terminal CODE here..  means by TC.. should i get type the Target channel.. so i think i have to first scan it..... ???


I've been really busy for a bit, you still interested in the term session? I don't have it saved or anything like that but I will do it again if you want

2
Hacking and Security / Re: Backtrack Wifi Cracking Problem
« on: May 27, 2012, 06:46:19 AM »

------------------


The following command i am using to crack WPA...
(((TB = target BSSID, TC = Target channel, CM = station))))



airmon-ng
airmon-ng start wlan0
airodump-ng mon0
airodump-ng -w wep --bssid TB -c TC mon0
aireplay-ng --deauth 1 -a TB -c CM mon0


etc.......


I would use 'airmon-ng start wlan0 TC'
I don't think that setting the channel in airodump-ng will keep the interface from channel hopping
Does airodump-ng confirm that it has detected a WPA handshake? I ask because for me airodump-ng would say that everything was captured correctly. But when attempting to crack pyrit was coming back saying that the capture file did not include a complete handshake. Drove me crazy until I found a patch for it. To make sure everything was working correctly I used a spare laptop to manually connect to my own WAP to ensure I had a valid handshake, once I made that work I moved on.

3
Hacking and Security / Re: Backtrack Wifi Cracking Problem
« on: May 26, 2012, 08:12:31 PM »

Make sure you set the channel on the monitor interface. If not the channel hopping can cause you to lose parts of the handshake.


Make sure airodump-ng is capturing all packets not just ivs


To find a hidden ssid deauth a client associated with the AP. Not sure how to discover without an associated client.


edit: what are you using to crack the handshake?

4
Creative Arts / Re: The Music Thread
« on: May 26, 2012, 05:54:41 AM »
Chelsea Grin - Sonnet of the Wretched


http://www.youtube.com/watch?v=XjECjnjl6_Q&ob=av3e

5
http://www.iphoneincanada.ca/app-store/ottawa-police-say-that-find-my-iphone-other-tracking-apps-arent-enough-for-a-search-warrant/


I guess it depends on your local PD but even with an IP I doubt anything will happen. Sorry, I also think it might be time for a new laptop.

6
For WPA/WPA2 word lists are useful and are often the only way to go, considering the only alternative is brute forcing. For both of them I use pyrit to help the process along much quicker than just a CPU.


The wordlist(s) I use are from g0tmi1k: [size=78%]http://g0tmi1k.blogspot.com/2011/06/dictionaries-wordlists.html[/size]


(Using pryrit with a Geforce 460 GTX I can go through the 18-in-1 word list in approximately 6 hours)


But recently I have been using reaver to brute force the WPS part of a router to obtain the WPA keyphrase. Its not very fast either but guaranteed to work as long as you give it enough time to do its thing.


Hope this is a helpful start for when you move onto WPA/WPA2

Pages: [1]


Want to be here? Contact Ande, Factionwars or Kulverstukas on the forum or at IRC.