Search:

Type: Posts; User: Mosh_; Keyword(s):

Search: Search took 0.00 seconds.

  1. Replies
    8
    Views
    12,248

    thx men, you really do a awesome work.

    thx men, you really do a awesome work.
  2. Discussioni: Deauth WPA Question

    by Mosh_
    Replies
    6
    Views
    3,198

    Temp Solution: I increase the number of...

    Temp Solution:

    I increase the number of packets to send for deauth to 50 and was fine....

    aireplay-ng -0 50 -a <BSSID> -c <MAC Client> interface
  3. Discussioni: Deauth WPA Question

    by Mosh_
    Replies
    6
    Views
    3,198

    Deauth WPA Question

    Hi everybody

    I have a problem with the client deauthentication for a WPA network, i have a ALPHA RTL8197 card and i can normally deauth all clients, but in this test when i try to deauth a client...
  4. Wonderfull

    Great job FiFo, i hope try this tomorow ;), by the way... dou you know about rcracki in the backtrack repos ?, all my rainbow tables are in the rti format, and i think this is better.

    Thank You !
  5. Discussioni: apt-get update

    by Mosh_
    Replies
    3
    Views
    1,935

    All clear Than you for your time ;)

    All clear

    Than you for your time ;)
  6. Discussioni: apt-get update

    by Mosh_
    Replies
    3
    Views
    1,935

    apt-get update

    Hi

    ┐what about the security debian packages?, Are they in the offensive-security repos too ? or is possible add to the source.list a line like "deb hxxp://security(dot)debian(dot)org ...."

    thx...
  7. Replies
    11
    Views
    5,085

    Thanx a lot for that information... i don't know...

    Thanx a lot for that information... i don't know about swap memory very much but that is great to begin.

    Thx again
  8. Discussioni: SMTP enumeration

    by Mosh_
    Replies
    8
    Views
    10,071

    Great tutorial

    Great tutorial
  9. Discussioni: remote hash

    by Mosh_
    Replies
    7
    Views
    1,852

    remote hash

    you can try the Massive Client Attack with fast track or metasploit.... only wait for the victim ;)

    Salu2
  10. Replies
    2
    Views
    2,764

    Shadow file...

    of course that is better with the Rainbow tables... you can use the rcrack for these procedure.

    rcrack *.rt -f <file with hashes>

    Salu2
Results 1 to 10 of 10