Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - palipr

Pages: [1]
1
Hacking and Security / Re: Backtrack Wifi Cracking Problem
« on: June 05, 2012, 04:14:53 am »

================================
thanks dude.. i am getting little bit you.. can u share terminal CODE here..  means by TC.. should i get type the Target channel.. so i think i have to first scan it..... ???


I've been really busy for a bit, you still interested in the term session? I don't have it saved or anything like that but I will do it again if you want

2
Hacking and Security / Re: Backtrack Wifi Cracking Problem
« on: May 27, 2012, 06:46:19 am »

------------------


The following command i am using to crack WPA...
(((TB = target BSSID, TC = Target channel, CM = station))))



airmon-ng
airmon-ng start wlan0
airodump-ng mon0
airodump-ng -w wep --bssid TB -c TC mon0
aireplay-ng --deauth 1 -a TB -c CM mon0


etc.......


I would use 'airmon-ng start wlan0 TC'
I don't think that setting the channel in airodump-ng will keep the interface from channel hopping
Does airodump-ng confirm that it has detected a WPA handshake? I ask because for me airodump-ng would say that everything was captured correctly. But when attempting to crack pyrit was coming back saying that the capture file did not include a complete handshake. Drove me crazy until I found a patch for it. To make sure everything was working correctly I used a spare laptop to manually connect to my own WAP to ensure I had a valid handshake, once I made that work I moved on.

3
Hacking and Security / Re: Backtrack Wifi Cracking Problem
« on: May 26, 2012, 08:12:31 pm »

Make sure you set the channel on the monitor interface. If not the channel hopping can cause you to lose parts of the handshake.


Make sure airodump-ng is capturing all packets not just ivs


To find a hidden ssid deauth a client associated with the AP. Not sure how to discover without an associated client.


edit: what are you using to crack the handshake?

4
Creative Arts / Re: The Music Thread
« on: May 26, 2012, 05:54:41 am »
Chelsea Grin - Sonnet of the Wretched


http://www.youtube.com/watch?v=XjECjnjl6_Q&ob=av3e

5
http://www.iphoneincanada.ca/app-store/ottawa-police-say-that-find-my-iphone-other-tracking-apps-arent-enough-for-a-search-warrant/


I guess it depends on your local PD but even with an IP I doubt anything will happen. Sorry, I also think it might be time for a new laptop.

6
For WPA/WPA2 word lists are useful and are often the only way to go, considering the only alternative is brute forcing. For both of them I use pyrit to help the process along much quicker than just a CPU.


The wordlist(s) I use are from g0tmi1k: [size=78%]http://g0tmi1k.blogspot.com/2011/06/dictionaries-wordlists.html[/size]


(Using pryrit with a Geforce 460 GTX I can go through the 18-in-1 word list in approximately 6 hours)


But recently I have been using reaver to brute force the WPS part of a router to obtain the WPA keyphrase. Its not very fast either but guaranteed to work as long as you give it enough time to do its thing.


Hope this is a helpful start for when you move onto WPA/WPA2

Pages: [1]