ah, come on.
Type: Posts; User: Wummi; Keyword(s):
ah, come on.
just some lousy lines of shell-fu using wlanconfig list
ill post more about the config/software soon
aren't there enough wep-crack-automation scripts already?
i didn't know about this. could you link me to something?
do the linksys routers really have 2 seperate radio circuits, or just 2 antennas with diveristy? that's the main reason for using 2...
this is a proof of concept most of all, i do not intend to use it.
BUT: i think its an interesting concept.
first: a few pictures of the build:
and it does tell me about the delicious contents of a cake, but it doesn't know that...
.. THE CAKE CAKE IS A LIE (omfgz ^^)
everybody knows that
start the thing, look at the processes running as admin/system, check the versions of those processes, look for exploits. might check the windows-updatestatus and bugfixes the system doesn't have. ...
i still don't understand the use for this. whats the reason on reducing the WEP cracking time anyhow? aircrack with its voting system is pretty darn fast. the next best texas instruments calc would...
why would you need this for WEP? does anyone really bruteforce WEP? why would someone?
also: GTFO the neighbors wifi ^^
i just skimmed trough this thread.
really? there are so FEW people on this board, that are concerned with a pre-installed backdoored BIOS, supplied by the laptop manufaturer?
things like that...
hey, thats pretty awsome.
but couldn't you just
sorry, had to do it :D
running linux on an eee 901, wich uses an asus 16 gb ssd.
the fact that its ssd shouldn't bother the OS, since communication is the same as with any other sata drive.
you could setup your http server with a transparent redirection to change the filename.
might do it with a simple .htaccess in flavor of:
thx for the welcome! ettercap works how you need it.
here's the real cert in firefox 2 :
here's the one ettercap sends:
uhm ettercap does exactly that with its SSL dissector...
EDIT: look into the etter.conf, check the redir command is set right
i'm almost bald from pulling my hair, when i try to modify an https page via etterfilter. (sorry in advance for bad spelling - i'm no native speaker)
scenario: standart arp mitm...
hey there, i'm new! (english is not my first language, so be kind to some grammar errors please :) )
my waiting period is over, but i still cant access the pentesting forum, so ill just post here...