Search:

Type: Posts; User: imported_=Tron=; Keyword(s):

Page 1 of 20 1 2 3 4

Search: Search took 0.02 seconds.

  1. Replies
    7
    Views
    1,325

    I don't know which tutorial you are referring to,...

    I don't know which tutorial you are referring to, but it is correct that macchanger requires you to either use -m or --mac to spoof a specific mac address.
  2. Most likely you are not successfully injecting...

    Most likely you are not successfully injecting packets in order to generate more IV’s which is why the process is so slow. There are multiple possible reasons for this and I really encourage you to...
  3. Replies
    3
    Views
    1,342

    Have you ensured that the card is not left in...

    Have you ensured that the card is not left in monitor mode? In order to connect to wireless APs you will need to be in managed mode.

    Using VMware, or any other virtualization program for that...
  4. Replies
    6
    Views
    1,592

    Perhaps I should rephrase to avoid any confusion....

    Perhaps I should rephrase to avoid any confusion. Intel based Macs are able to boot from USB using EFI, however booting linux can require rEFIt and some work. There are some nice guides and sources...
  5. Replies
    6
    Views
    1,592

    All Intel based Macs should support booting from...

    All Intel based Macs should support booting from USB without any tinkering.
  6. Replies
    11
    Views
    2,280

    If it is something you want to be able to do...

    If it is something you want to be able to do remotely using any device with an internet connection there are quite a few free online services that will send out the magic packet for you. I remember...
  7. Thanks PostalService for the update, it indeed...

    Thanks PostalService for the update, it indeed looks like the link I provided in my original post have died. I will take a look at the new driver, try to track down a direct source and update my...
  8. Replies
    3
    Views
    1,506

    Check under which name your HDD is mounted and...

    Check under which name your HDD is mounted and specify the full path to this location in airodump-ng. For example if it is mounted as hda1 the path would be:
    airodump-ng wlan0 -w /mnt/hda1/dumpfile...
  9. Replies
    215
    Views
    86,199

    Even though the link seems to be updated with the...

    Even though the link seems to be updated with the correct information now it might be in place to emphasize that the GTA02 model which currently is on the market and which have been discussed...
  10. As you state that your card does not support...

    As you state that your card does not support injection you will need to use another wirelessly connected device to generate the data packets. The easiest way to do this is to simply connect another...
  11. Replies
    79
    Views
    36,079

    Considering that the set-up is a bit more...

    Considering that the set-up is a bit more involved than simply point and click and that this is the only piece of information you provide us with, it is impossible to tell with any certainty what the...
  12. Replies
    3
    Views
    2,689

    The AWUS036H is supported out of the box and as...

    The AWUS036H is supported out of the box and as it supports monitor mode as well as injection you will be able to crack both WEP and WPA/WPA2 encryption using it.
  13. Replies
    6
    Views
    3,215

    Well frankly that is the whole point of requiring...

    Well frankly that is the whole point of requiring valid certificates for a secure connection. However, I think you would be amazed by the number of people that have got so used to seeing warning...
  14. Replies
    13
    Views
    2,146

    A well earned first place! :D

    A well earned first place! :D
  15. Replies
    3
    Views
    2,689

    Take a look at this thread...

    Take a look at this thread. To sum it up, the default driver for the card does not support WPA/WPA2 in managed mode. I do not recall that it wont even correctly recognize the encryption method used,...
  16. Replies
    11
    Views
    1,668

    This information will be completely useless for...

    This information will be completely useless for anyone else than the OP. First of all the signal strength readings given by airodump-ng is not comparable between different drivers and/or wireless...
  17. Replies
    7
    Views
    1,466

    You are confusing two entirely different things...

    You are confusing two entirely different things now. The signal strength that you can derive from the airodump-ng output indicates how well you are able to hear the signal transmitted from the AP....
  18. Using the latter command will compute the list...

    Using the latter command will compute the list for the wrong ESSID as hack_this_AP naturally isn't the same as hack this AP. Instead try using this command:
    python pyrit.py -e "hack this AP"...
  19. Replies
    1
    Views
    1,555

    You do not give us much to bite in here. Which...

    You do not give us much to bite in here. Which attack are you using to speed up the generation of data packets or do you use any at all? If you are unfamiliar with the whole process take a look at...
  20. Is there any traffic on the AP? Some wireless...

    Is there any traffic on the AP? Some wireless routers will not send out any data packets at all that you can use for the attack, unless a client is authenticated and requesting the packets.

    My...
  21. Replies
    9
    Views
    3,355

    First of all I can't help wondering why you put...

    First of all I can't help wondering why you put the card against your ear in the first place?

    I noticed this same behaviour from my Alfa 500mw card after some time of use. In the beginning it did...
  22. Replies
    8
    Views
    1,139

    So very, very true. A lot of people seem to...

    So very, very true. A lot of people seem to concentrate only on the new tools and exploits that come out, although the same old tricks that worked 15 years ago still work today.
  23. Replies
    65
    Views
    43,363

    Can’t wait to take this one out for a spin. A big...

    Can’t wait to take this one out for a spin. A big thank you to Muts and the rest of the development team for all your great work. :D
  24. Replies
    8
    Views
    1,678

    Also if you find the tinfoil hat to be a bit too...

    Also if you find the tinfoil hat to be a bit too complex in structure and have a Nvidia CUDA enable card this thread might be of interest to you.
  25. Replies
    8
    Views
    1,139

    Exactly, especially if the user chooses a long,...

    Exactly, especially if the user chooses a long, 63 characters is the upper limit, password cracking it using a dictionary attack becomes unfeasible.

    Of course there are always client side...
Results 1 to 25 of 500
Page 1 of 20 1 2 3 4