Hi there.. I love the forums and how helpful the posts actually are. I am just looking to find out if there is any location to grab the 7GB password list. The torrent appears to be down (the tracker's not tracking the torrent, I believe). I would do all the computing myself but I can't keep my computer running for the long, unfortunately. Any help would be excellent.
Yeah, sorry about the terminology. I may just have to go with the 34GB version. I hadn't planned on it only because of the required space (would have to fix some partitions) but I may go that route than.
On an unrelated note, I'm curious if anyone has had any issues with rebooting. Everytime I reboot from Backtrack, I actually have to go through a check whenever it boots as "Backtrack was not cleanly unmounted". I actually had to manually use fsck. I'm just wondering if I'm missing something when rebooting (using the shutdown -r now or reboot commands).
[CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
[CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
[URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
[URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
[URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]
[URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
Hi, I am trying to learn how to use the Rainbow table from the Church of Wifi. Here is where I am at.
Using Backtrack 3
able to get handshake from target
already downloaded the 30+ rainbow table and saved on a external drive.
also have downloaded a 4 gig+ dictionary file and saved on a external drive.
can someone give step by step to apply the hash table with the handshake.cap file? I tried using aircrack-ng and bruteforcing the .cap file against my 4gig+ dictionary and it's taking way too long. People say that by using the rainbow table it can be done alot faster. But i dont know how to do that. I thank you very much for any help.
Where:Code:./cowpatty -r wpa.cap -d hashfile -s mySSID
wpa.cap is the capture file
hashfile is the output file
mySSID is the network SSID
coWPAtty is detailed here:
Stop the TSA now! Boycott the airlines.