Search:

Type: Posts; User: iliyapolak; Keyword(s):

Page 1 of 3 1 2 3

Search: Search took 0.00 seconds.

  1. Replies
    21
    Views
    12,578

    Re: bypassing mac filters?

    Let him practise.
  2. Re: "Sniff" subnet mask and IP "from outside" when you only got 2 MAC-adresses

    kismet can differentiate between wireless and wired clients.
  3. Re: "Sniff" subnet mask and IP "from outside" when you only got 2 MAC-adresses

    as far as i remember in the protocols drop-down menu choose 802.11 and enter your passphrase.
  4. Replies
    8
    Views
    3,176

    Re: wireless mac address and dic attack

    use windows ping command
  5. Replies
    21
    Views
    12,578

    Re: bypassing mac filters?

    Yes i agree with you, but as far as i know there is an ongoing research on more advanced counter-spoofing methods like a spectral analysis of various wi-fi chipsets , driver timing analysis and...
  6. Replies
    21
    Views
    12,578

    Re: bypassing mac filters?

    By displaying my knowledge am i hurting you?
    Is it forbidden here to be a knowledgeable person?
    I respect other people and i often offer them a helping hand , but sometimes my language is going to...
  7. Replies
    19
    Views
    7,189

    Re: Deauth Windows 7 on BT5

    I was talking about the adding NEW FEATURES LIKE A 802.11W into windows7 network stack and it is called vendor implementation.
    You simply misunderstood me.
  8. Replies
    21
    Views
    12,578

    Re: bypassing mac filters?

    You can spoof data frames when WPA2 is used only when you have recovered a key , otherwise your data frames will be rejected.

    Perhaps you should have toroughly read and be able to understand ...
  9. Re: "Sniff" subnet mask and IP "from outside" when you only got 2 MAC-adresses

    If you have a valid WEP key you can use wireshark with this key in order to dissect wep-encrypted data packets and by analyzing 802.11 frame's payload (3,4 and 7 layer protocols) you will obtain all...
  10. Replies
    19
    Views
    7,189

    Re: Deauth Windows 7 on BT5

    As i have said it is all left to the vendor's implementation.
  11. Replies
    19
    Views
    7,189

    Re: Deauth Windows 7 on BT5

    Only if 802.11w was not implemented.
  12. Replies
    8
    Views
    3,176

    Re: wireless mac address and dic attack

    ping unavailable host

    it is used also to hide your network interface identity
  13. Replies
    19
    Views
    7,189

    Re: Deauth Windows 7 on BT5

    sorry double post
  14. Replies
    19
    Views
    7,189

    Re: Deauth Windows 7 on BT5

    freemyggle
    Did quick search and i have found that new amendment 802.11w protects management frames against the spoofing attacks.Now the right question is does any AP firmware...
  15. Replies
    19
    Views
    7,189

    Re: Deauth Windows 7 on BT5

    Freemyggle
    I think that it all boils down to the windows 7 implementation of 802.11 standard particulary dealing with the security. Afaik data packets are fully protected against the...
  16. Replies
    19
    Views
    7,189

    Re: Deauth Windows 7 on BT5

    As i stated earlier in the other post you cannot spoof AP or other client when WPA/WPA2 is used because of replay and spoofing attack protection which is binding session tokens to the mac addresses....
  17. Discussioni: wep problem

    by iliyapolak
    Replies
    8
    Views
    2,563

    Re: wep problem

    Newer AP are less vulnerable to aircrack attacks even when WEP is switched on.Maybe there is implemented some kind of custom replay protection.
    To completely answer your question an access to AP...
  18. Replies
    21
    Views
    12,578

    Re: bypassing mac filters?

    When WPA/WPA2 is used you cannot impersonate a client because of session tokens binding.
    Moreover spoofing can be prevented easily by simple state machine algorithm for example measuring preamble...
  19. Replies
    1
    Views
    6,507

    Re: I don't know how to add a source on kismet?

    Enter wlanx , where x=your interface number (0,1,...) old ieee802.11 driver stack
    or monx , where x=your monitor mode interface (0,1,..) only works when new mac802.11 driver stack is used.
  20. Replies
    19
    Views
    7,189

    Re: Deauth Windows 7 on BT5

    I'm simply encouraging you to learn the theoretical side of the hacking and pentesting there are tons of books that are teaching you the inner workings of the hacking.
    I have spent countless hours...
  21. Replies
    21
    Views
    12,578

    Re: bypassing mac filters?

    It depends on the AP firmware implementation , also in the WPA/WPA2 spoofing and replay attacks are fought with the binding of the keys to the mac addresses.
  22. Discussioni: ettercap sniffing

    by iliyapolak
    Replies
    3
    Views
    4,868

    Re: ettercap sniffing

    You provided here an example of your lack of knowledge because whene you have WEP encrypted network with rc4 cipher your sniffing software won't decrypt any data packet without the key you can only...
  23. Replies
    19
    Views
    7,189

    Re: Deauth Windows 7 on BT5

    י
    why do not you try to dissasemble NDIS.sys driver and look for auth/deauth security related custom routines maybe you should also try to reverse-engineer whole win 7 network driver stack to learn...
  24. Discussioni: wep problem

    by iliyapolak
    Replies
    8
    Views
    2,563

    Re: wep problem

    I thought that it is your network.

    Sometimes AP will send disassociation frame because of inactivity it is implemented by some TP-LINK routers.
  25. Replies
    7
    Views
    2,193

    Re: Building PC for WPA purpose need advice...

    Only if you could spend 10k on such a system i will recommend you go and buy it.
    Get yourself a nice nehalem family cpu (quad core) and latest and greatest nvidia gpu.
Results 1 to 25 of 74
Page 1 of 3 1 2 3