I've been reading this forum now for abit and find it very interesting subject.
I have already broken WEP on my router and WPA-PSK using a simple dictionary word by using Xploits really good tutorials.
But what if I change the passkey to say david123 that is not in my dictionary file.
My understanding is that, if this is not in my dictionary file then it cannot be easily done. Only a hash table which are gigabits big is the only way to speed up the process of going thru all the different number of combination passkeys to get the correct one of david123?
Or is it something more simple?
Also, Im thinking of buying just a cheap laptop and connecting it to my router to then use nmap tool and experiment with that. Would you say this step is the next logical one in learning how to increase my knowledge further in this field. I at the moment look after our computer network at work, and find this subject of security really interesting.
Any ideas would be of great help .
Hello davidjnr, and welcome to remote-exploit! :) I like your enthusiasm.
Originally Posted by davidjnr
Let me start by saying that there is more than one way to skin a cat. But the cold harsh reality is that if your passphrase is NOT in your dictionary...you cant Brute Force it....PERIOD...forget what everyone else has told you..or what you have heard..their wrong. Plain and simple. I have 2 videos on cracking WPA/WPA2..one basic..and one where I use airolib and mysql databases to precompute a table of hashes with your essid.
The basic one is found here...
And the precomputed databases is here...
Both go into great detail..probably more than you ever wanted to know if your just starting out.
Let me make this as clear as possible....If your passphrase is david123 and you have 100,000 gigabytes or 1,000,000,000 petabytes ...and your passphrase is NOT IN THAT DATABASE or DICTIONARY..IT WILL FAIL!!! You can have every word in the whole English or World language..and if that passphrase is NOT in that database or wordlist..it won't work.
Yes..a precomputed hash table database WILL SPEED UP THE PROCESS GREATLY...but if its not in that database..your S.O.L my friend.
My suggestion to you davidjnr, is to master cracking WEP and WPA/WPA2 BEFORE you tread the waters of -=Xploiting=-. Metasploit..nessus ..nmap..are all great tools..but if you cant break the AP..then you don't need the tools cause you won't be able to use them until you crack the AP.
Focus on that..and use nessus instead of nmap. I prefer nessus over nmap any day.
That's a great tool to help you secure the network you manage; will definitely help you in tidying up those pc's running unwanted/unnecessary services, network daemons, open ports, etc.
Originally Posted by -=Xploitz=-
There are a lot of other tools in B|T that you will find very beneficial down the road to help you even further... but just as someone else wrote on this forum a ways back, learn them 1 @ a time!!!
I can see now why windows is very not secure if you got a program like Metasploit that crashes the system to then get a control prompt, by mainly using the buffer overflow method I assume. I bet people spend ages debuging the programs to make them crash all the time.
Originally Posted by -=Xploitz=-
I think i messed up the last message, hope it makes sense .
I dont really know linux at all, but I do prefer the command lines as it brings me back to the day of using DOS lol
Oh what happy memories :)