Results 1 to 6 of 6

Thread: Church of Wifi

  1. #1
    Just burned his ISO
    Join Date
    Mar 2008
    Posts
    2

    Default Church of Wifi

    Hi there.. I love the forums and how helpful the posts actually are. I am just looking to find out if there is any location to grab the 7GB password list. The torrent appears to be down (the tracker's not tracking the torrent, I believe). I would do all the computing myself but I can't keep my computer running for the long, unfortunately. Any help would be excellent.

  2. #2
    Moderator theprez98's Avatar
    Join Date
    Jan 2010
    Location
    Maryland
    Posts
    2,533

    Default

    Quote Originally Posted by ScrewzLuse View Post
    Hi there.. I love the forums and how helpful the posts actually are. I am just looking to find out if there is any location to grab the 7GB password list. The torrent appears to be down (the tracker's not tracking the torrent, I believe). I would do all the computing myself but I can't keep my computer running for the long, unfortunately. Any help would be excellent.
    The 7GB torrent is not a password list, but a series of pre-computed WPA hash tables. I'm not sure if they are still available. The 34GB tables have been more popular as of late.
    "\x74\x68\x65\x70\x72\x65\x7a\x39\x38";

  3. #3
    Just burned his ISO
    Join Date
    Mar 2008
    Posts
    2

    Default

    Yeah, sorry about the terminology. I may just have to go with the 34GB version. I hadn't planned on it only because of the required space (would have to fix some partitions) but I may go that route than.


    On an unrelated note, I'm curious if anyone has had any issues with rebooting. Everytime I reboot from Backtrack, I actually have to go through a check whenever it boots as "Backtrack was not cleanly unmounted". I actually had to manually use fsck. I'm just wondering if I'm missing something when rebooting (using the shutdown -r now or reboot commands).

  4. #4
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by ScrewzLuse View Post


    On an unrelated note, I'm curious if anyone has had any issues with rebooting. Everytime I reboot from Backtrack, I actually have to go through a check whenever it boots as "Backtrack was not cleanly unmounted". I actually had to manually use fsck. I'm just wondering if I'm missing something when rebooting (using the shutdown -r now or reboot commands).
    See my fix here>>

    Code:
    http://forums.remote-exploit.org/showthread.php?p=74893#post74893
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  5. #5
    Just burned his ISO
    Join Date
    Jul 2008
    Posts
    3

    Default Need help with Church Wifi Hash Rainbow table

    Hi, I am trying to learn how to use the Rainbow table from the Church of Wifi. Here is where I am at.

    Using Backtrack 3
    able to get handshake from target
    already downloaded the 30+ rainbow table and saved on a external drive.
    also have downloaded a 4 gig+ dictionary file and saved on a external drive.

    can someone give step by step to apply the hash table with the handshake.cap file? I tried using aircrack-ng and bruteforcing the .cap file against my 4gig+ dictionary and it's taking way too long. People say that by using the rainbow table it can be done alot faster. But i dont know how to do that. I thank you very much for any help.

  6. #6
    Senior Member Thorn's Avatar
    Join Date
    Jan 2010
    Location
    The Green Dome
    Posts
    1,509

    Default

    Quote Originally Posted by Musashi View Post
    Hi, I am trying to learn how to use the Rainbow table from the Church of Wifi. Here is where I am at.

    Using Backtrack 3
    able to get handshake from target
    already downloaded the 30+ rainbow table and saved on a external drive.
    also have downloaded a 4 gig+ dictionary file and saved on a external drive.

    can someone give step by step to apply the hash table with the handshake.cap file? I tried using aircrack-ng and bruteforcing the .cap file against my 4gig+ dictionary and it's taking way too long. People say that by using the rainbow table it can be done alot faster. But i dont know how to do that. I thank you very much for any help.
    You have to use coWPAtty. (By the way, the dictionary file is useless for this.)
    Code:
    ./cowpatty -r wpa.cap -d hashfile -s mySSID
    Where:
    wpa.cap is the capture file
    hashfile is the output file
    mySSID is the network SSID

    coWPAtty is detailed here:
    http://www.willhackforsushi.com/Cowpatty.html
    Thorn
    Stop the TSA now! Boycott the airlines.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •