Results 1 to 9 of 9

Thread: Video - How To Crack WEP Key with NO CLIENT connected

  1. #1
    Just burned his ISO
    Join Date
    Aug 2008
    Posts
    8

    Default Video - How To Crack WEP Key with NO CLIENT connected

    This is the first Video with ping method:

    xxx.megaupload.com/?d=9Z5LHTE7

    Or

    files.filefront.com/PartOne+Wep+Cracking+Higheavi/;11799782;/fileinfo.html

    Bye

  2. #2
    Just burned his ISO
    Join Date
    Aug 2008
    Posts
    8

    Default

    Quote Originally Posted by Kadam View Post
    This is the first Video with ping method:

    xxx.megaupload.com/?d=9Z5LHTE7

    Or

    files.filefront.com/PartOne+Wep+Cracking+Higheavi/;11799782;/fileinfo.html

    Bye
    Sorry for bad quality....i'm intent to post another better...but you can have an idea...

  3. #3
    Senior Member
    Join Date
    Apr 2008
    Posts
    2,008

    Default

    How is this a no client method for cracking WEP? Isn't the second wireless card, the one used for pinging, in managed mode and connected to the AP, i.e. acting as a client?

    Pardon me if I am missing something, but with the speed the video goes at it is hard enough to tell what is going on.
    -Monkeys are like nature's humans.

  4. #4
    Just burned his ISO
    Join Date
    Aug 2008
    Posts
    8

    Default

    Quote Originally Posted by =Tron= View Post
    How is this a no client method for cracking WEP? Isn't the second wireless card, the one used for pinging, in managed mode and connected to the AP, i.e. acting as a client?

    Pardon me if I am missing something, but with the speed the video goes at it is hard enough to tell what is going on.
    you have right...too fast...
    the second card (without monitor mode) only intent the connection with a random key to the AP from the panel "wireless assistants", while you ping the AP.

    I've read this method on this forum without exhaustive explication, so i've realized the video.......

  5. #5
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Isn't there already a video that shows how to do this and does it better?

    Why re-invent the wheel?
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  6. #6
    Just burned his ISO
    Join Date
    Aug 2008
    Posts
    8

    Default

    Quote Originally Posted by streaker69 View Post
    Isn't there already a video that shows how to do this and does it better?

    Why re-invent the wheel?
    can give me the link?

    If you refer to the video no client on this forum....doesn't work with any AP and wireless card..

    there is a video or a link with information about mdk3 method too?

    Thanks

  7. #7
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Quote Originally Posted by Kadam View Post
    can give me the link?
    thanks
    A forum search for 'NO CLIENT" returns this:

    http://forums.remote-exploit.org/sho...ight=NO+CLIENT
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  8. #8
    Just burned his ISO
    Join Date
    Aug 2008
    Posts
    8

    Default

    Quote Originally Posted by streaker69 View Post
    A forum search for 'NO CLIENT" returns this: ]
    ahah...you are kidding me?

    Try really without a client...not all ap work in the same way

    in that video i don't see how ping an ap that i've not access (i'm not a expert and probably i don't know how do it)...
    so the way can i found is intent manually connection..but my APs answer with ACKs

  9. #9
    Junior Member
    Join Date
    Sep 2008
    Posts
    25

    Default

    Yea sorry, I tried using the filefront link and I can't read a thing you type.. Also from the sound of the rest of the thread it seems like you aren't using a true clientless attack.

    Clientless attacks have been hit and miss for me in the past, it sometimes works and sometimes fails at any stage of the attack. I'm relatively new to this whole scene and I'm still trying to get each attack down, but I'm getting there.

    I don't have a link for the other video, but check the search function and find stuff from -=Xploitz=-, he had made the tutorials. They are really clear and show many different attack types.

    Edit: Got them for ya cuz I'm a nice guy:
    And then I realised I could not link...

    Here's the forum tree for it though:

    Remote Exploit Forums > BackTrack v2.0 Final > Tutorials & Guides
    > -=Xploitz=- VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •