SmallNetBuilder Forums
Go Back   SmallNetBuilder Forums > Wireless Networking > Wireless Article Discussions

Reply
 
Thread Tools Search this Thread Display Modes
  #11  
Old 02-08-2009, 03:31 PM
Unregistered
Guest
 
Posts: n/a
Question new at this need help

hey
Can anyone recommend what kind of wireless card to get for my laptop that run the backtrack or Auditor Security Collection? email me at jimmihendrix82@yahoo.com
Reply With Quote
  #12  
Old 02-14-2009, 12:47 PM
sin4me sin4me is offline
New Member
 
Join Date: Feb 2009
Posts: 4
Thanks: 0
Thanked 0 Times in 0 Posts
sin4me is just starting out
Default

Quote:
Originally Posted by Unregistered View Post
hey
Can anyone recommend what kind of wireless card to get for my laptop that run the backtrack or Auditor Security Collection? email me at jimmihendrix82@yahoo.com
The list of supported devices for BacktTrack is located here.

I'm currently using a Hawking HWUG1 which uses the RT73 chipset - it works right out of the box with BackTrack 3 Final. So far, I've only setup my test AP with WEP to get familiar with the aircrack-ng suite; however, I was able to crack the password I created in less than 1 min. WPA will obviously take longer, but at least I know all the tools support my adapter without having to install updated drivers or patches.

This is another great article - very concise & easy to follow. Thanks again SNB!
Reply With Quote
  #13  
Old 04-08-2009, 09:42 AM
worto03 worto03 is offline
New Member
 
Join Date: Apr 2009
Posts: 1
Thanks: 0
Thanked 0 Times in 0 Posts
worto03 is just starting out
Default .

Hi,

Good article, if I'm getting no clients showing up at all when I know there is one connected whats the likely cause?

I have picked up all of the network info like the channel & Encryption type ect but clients always reads 0

I get the below info back from a iwconfig of my network card & if I'm getting as far as seeing the packet count going up and getting the channel info does that mean my card is working OK & is supported?


Quote:
wlan0 IEEE 802.11g Nickname:""
Mode:Monitor Frequency:2.412 GHz Tx-Power=27 dBm
Retry min limit:7 RTS thr: off Fragment thr=2346 B
Encryption key: off
Power Management: off
Link Quality: 0 Signal level:0 Noise level:0
Rx invalid nwid: 0 Rx invalid crypt:0 Rx invalid frag:0
Tx excessive retries: 0 Invalid misc:0 Missed beacon:0

Thanks for any help,
worto.

edit - I have the Intel(R) PRO/Wireless 3945ABG Network card which doesn't seem to be in the above list - do I need to look at getting another network card?

Last edited by worto03; 04-08-2009 at 09:59 AM. Reason: additional info about network card
Reply With Quote
  #14  
Old 05-11-2009, 08:50 PM
spankky spankky is offline
New Member
 
Join Date: May 2009
Posts: 1
Thanks: 0
Thanked 0 Times in 0 Posts
spankky is just starting out
Default wpa hacking

hello everyone.i am a newbie at this thought id never say it lol. anyways i put in a random password to my next door friends wpa network and got limited connection. it gave me the physical address and ip and subnet but i couldnt get it to give me a ip. so anyways if the user has access to 1 ip can more then one connect to it? dam wish there was a program just click and it hooks ya up lol . well any info i will aprechiate
Reply With Quote
  #15  
Old 02-17-2010, 01:45 PM
dakykilla dakykilla is offline
New Member
 
Join Date: Feb 2010
Posts: 1
Thanks: 0
Thanked 0 Times in 0 Posts
dakykilla is just starting out
Default Online WPA Password Cracker Available

After you capture a WPA/WPA2 handshake you can use the Question Defense Online WPA Password Cracker to run a dictionary attack against the capture. There is a fairly high success rate in cracking WPA/WPA2 passwords since most people use short passwords only reaching 8 characters in length as required by WPA.

If you are unfamiliar with how to capture WPA handshakes there are directions to do so here.
Reply With Quote
  #16  
Old 03-22-2011, 07:57 PM
Unregistered
Guest
 
Posts: n/a
Default @wort

You can test your injection capabilites by using aireplay-ng -9 option by sending packets and waitng for ACKs back. %100 is what should be strived for
Reply With Quote
  #17  
Old 04-25-2011, 07:56 PM
hceuterpe hceuterpe is offline
New Member
 
Join Date: Aug 2010
Posts: 12
Thanks: 0
Thanked 0 Times in 0 Posts
hceuterpe is just starting out
Default

There's no sure fire bet that WPA/WPA2 can be cracked like this. It's only if the user who setup the target WiFi AP was stupid and set a very weak password. This is opposed to WEP that's crackable regardless of the complexity of the key.

This is why I fire:
head -c 32 /dev/random | sha256sum -b

in a linux console window, for my WPA2 keys.

Last edited by hceuterpe; 04-25-2011 at 07:59 PM.
Reply With Quote
  #18  
Old 07-20-2011, 06:54 PM
techieguy
Guest
 
Posts: n/a
Talking Cracking WPA/WPA2 is Jst DRAMA,

______________________________*_____

Cracking WPA is Jst DRAMA. . Part 1

______________________________*_____

Cracking WPA/WPA2 is highly IMPOSSIBLE.

______________________________*_____

lemme explain you , cracking WPA means jst capturing encrypted information and applying dictionary/wordlist. bt the key should be min 8 to 63 digits in length., so number of possible combinations of 8 digit lenngth password : 218,340,105,584,896 . Is it possible check all des words??


Cracking WPA is jst kind of DRAMA - part 2

______________________________*________

in SOME VIDEOs , ppl are cracking within 1min. how is it POSSIBLE ?

Simple they write the actual PASSWORD in dictionay file( and the file contains very less words ) nd appply this word list ..

thats they show ' WE CRACKED WPA/WPA2 WITH IN 60 SECONDS' .

this is one kind of CH*ATING..

----------------------------------------------
BIG D R A M A , Cracking WPA/WPA2 - part 3

For Suppose , your computer check da 500 keys/second ,

den it will take 218,340,105,584,896/500/60/60 = ??

it will take YEARS to crack the password.. So its better NOT to try..

NB : I am NOT abusing anyone , Jst telling da FACT.

HIGHLY IMPOSSIBLE , CRACKING WPA/WPA2
Reply With Quote
  #19  
Old 07-29-2011, 08:14 PM
Unregistered
Guest
 
Posts: n/a
Default "Cracking WPA/WPA2 is Jst DRAMA," urmm noo

techieguy your post is complete and utter bullsh*t..

1. yes there are (26+26+10)^8 theoretical combinations for a WPA/2 passphrase however the owner of the AP may not have been smart enough to change his passphrase to something like Iiss1337 which contains numbers, lower_alpha and upper_alpha and indeed something longer than 6 chars. it is far more likely, due to human tendencies, to choose a password someone can remember, eg a word with only letters in. which we can cover with a dictionary file!

if the dictionary attack fails we have to resort to brute force.

The if someone has bought a router from a specific ISP eg. sky (im from the uk) then the passphrase is guaranteed (if it hasnt been changed) to contain only upper_alpha characters. i am not sure about other ISPs but i think this is true for sky routers/APs. so the poss combinations is "only" 26^8 (in this specific example).

2. its always good when cracking to use a dictionary file first.... cheaper in terms of electricity and computational power... plus i would be kicking myself if i found out that the APs passphrase was "password" (in any dictionary file) after waiting hours by doing a brute force.

3. 500 k/s is very slow... i can usually achieve around 1000 k/s using my 4gb ram and 2ghz processor speed. p/s will get bigger and bigger the more ram and proc. speed you have.

It is poss to use this along with GPU cracking if you have a graphics card (Nvida, Radeon etc) using a program called pyrit. ive seen people achieve speeds of well over 20,000 p/s and you can speed this up further by using cowpatty which uses procomputed hashes of all the passphrases in a list (could be every poss combination) based on a specific APs BSSID/ESID. This reduces the time to hours

also you can pay to have the handshake cracked online (few hours ~$20 last time i checked)

sincerely,
aircrack-ng suite, cowpatty, pyrit, proper penetration-testers and hackers
Reply With Quote
  #20  
Old 11-24-2011, 12:33 AM
Unregistered
Guest
 
Posts: n/a
Default Try gpuhash.com

I have just discovered new online WPA cracking service - gpuhash.com
Amazing true success rate - 20%!
Reply With Quote
Reply

Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off


All times are GMT -4. The time now is 10:16 PM.


Top 10 Stats
Top Posters* Top Thanked
RMerlin  354
john9527  147
azazel1024  134
stevech  119
htismaqe  99
L&LD  98
sfx2000  76
TonyH  72
AndreyPopov  56
ChristineBCW  54
RMerlin  6016
john9527  374
stevech  349
ryzhov_al  277
TeHashX  232
L&LD  231
RogerSC  199
sinshiva  147
sfx2000  133
joegreat  126
Most Viewed Threads* Hottest Threads*
Old Shellshock...  27503
Old Asuswrt-Merli...  10826
Old Antenna...  3904
Old Simple NAS...  2392
Old Brainstorming...  2195
Old Looking for...  1961
Old RT-AC68P  1861
Old Advice on...  1603
Old RT-AC68U...  1383
Old Asus...  1304
Old Asuswrt-Merli...  86
Old Antenna...  73
Old Advice on...  47
Old Brainstorming...  47
Old Simple NAS...  36
Old Looking for...  35
Old Shellshock...  31
Old Stable...  25
Old WiFi Rates  23
Old Issues...  23


Powered by vBulletin® Version 3.7.3
Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.
© 2006-2014 Pudai LLC All Rights Reserved.