Page 29 of 30 FirstFirst ... 1927282930 LastLast
Results 281 to 290 of 294

Thread: Announcement: WEPBuster Beta Finally Released!

  1. #281
    Super Moderator Archangel-Amael's Avatar
    Join Date
    Jan 2010
    Location
    Somewhere
    Posts
    8,012

    Default

    Quote Originally Posted by neerajverma View Post
    hey guys, i m sry for going off topic.

    i jus wanna know if any one could modify backtrack disk and put wepbuster 0.7 on it???
    i know its possible, but seems hard for me.
    i m right now using frhack disk but it got 0.6 version.
    Yes you can remaster the BT ISO.
    We do not support FRhack so forget it.
    Check the Off-Sec blog
    To be successful here you should read all of the following.
    ForumRules
    ForumFAQ
    If you are new to Back|Track
    Back|Track Wiki
    Failure to do so will probably get your threads deleted or worse.

  2. #282
    Just burned his ISO
    Join Date
    Dec 2009
    Posts
    3

    Default re

    i have been there before , i even saw the processing they do for extracting dvd content and then modify and remake dvd.

    but its hard for me to do because i am sill learner. i cant do alone.
    so can ny one make modified disk and put the url here to share with others with all new updates (actually i want that backtrack creater to see my topic and make update of the disk)
    but if any one else can, plz do a favour to us.

  3. #283
    Super Moderator lupin's Avatar
    Join Date
    Jan 2010
    Posts
    2,943

    Default

    Quote Originally Posted by neerajverma View Post
    i have been there before , i even saw the processing they do for extracting dvd content and then modify and remake dvd.

    but its hard for me to do because i am sill learner. i cant do alone.
    Give it a try, there are good instructions for it on the Offsec blog and it will be a good learning experience for you. You may as well, because I can tell you right now the chances of someone doing it for you are not great.
    Capitalisation is important. It's the difference between "Helping your brother Jack off a horse" and "Helping your brother jack off a horse".

    The Forum Rules, Forum FAQ and the BackTrack Wiki... learn them, love them, live them.

  4. #284
    Junior Member daffyduc's Avatar
    Join Date
    Nov 2009
    Posts
    27

    Default

    Quote Originally Posted by Sniffing4Prison View Post
    I tried using cpan and it was a torrent of failure and suffering.

    Instead I just ran:


    cd ../../../pentest/wireless/
    wget "http://wepbuster.googlecode.com/files/wepbuster-1.0_beta-0.7.tgz"
    tar xzf wepbuster-1.0_beta-0.7.tgz
    rm -rf wepbuster-1.0_beta-0.7.tgz
    mv wepbuster*/ wepbuster/

    aptitude install -y libexpect-perl

    I hope this helps someone.

    ~~~EDIT

    I only had it set to run against my AP... from boot to key It was about two minutes (I still had to ping my router to get IVs going, because of the way it's configured). Thanks for writing this.

    Wepbuster cracked it at 32,000 Initialization Vectors.
    When I did aircrack-ng myself. I had to get 170,000 IVs.

    I'm not sure what "channel 1, 6, 11 for US" and "1, 5, 9, 13 for EU" is all about, because I see AP's on 1-11 for US and 1-13 for EU.
    Install worked like a charm

    Thanks

  5. #285
    Member squishyalt's Avatar
    Join Date
    Feb 2010
    Posts
    172

    Default A problem running Wepbuster.....

    I don't know what the problem is - so I'll just post the konsole session output and pray that someone has an idea....

    (I was testing this - with permission - on an AT&T store's WEP.)

    Code:
    root@bt4-pre:/pentest/wireless/wepbuster# perl wepbuster
    
    Detecting wireless interfaces...
    
    ---------------------------------------------------------
    
    Found wlan0...
    Getting monitor interface...
    monitor interface --> mon0
    
    Found 1 useable wireless card(s)
    
    wlan0/mon0
    
    =========================================================
    
    No valid channel entered. Using the default ( US = 1 6 11 )
    
    
    MODE: crack     (using: wlan0/mon0 == 00:0e:3b:0e:1c:86)
    
    Scanning channel 6 for WEP-enabled Access Points
    ......
    Found 1 AP(s) on channel 6
    
         BSSID              IV      CHANNEL SSID           ASSOCIATED CLIENTS
    
    00:21:1E:3D:D5:90       0       6       AT&T Back Office
    
    
    Scanning channel 1 for WEP-enabled Access Points
    ......
    Found 0 AP(s) on channel 1
    
    
    
    Scanning channel 11 for WEP-enabled Access Points
    ......
    Found 0 AP(s) on channel 11
    
    
    
    Total AP found: 1
    
    Now starting to crack...
    
    
    #########################################################
    
    Pwning "AT&T Back Office " (00:21:1E:3D:D5:90)     Thu Dec 10 17:59:19 2009
    Checking for mac filtering...
    Can't associate. aireplay-ng died!
    
    Attack was unsuccessful. Possible reasons:
    
    Too many to mention. =)
    Try running this command manually:
    
    "aireplay -1 1 -a 00:21:1E:3D:D5:90 wlan0 -e "AT&T Back Office " -h 00:0e:3b:0e:1c:86 2>&1"
    
    #########################################################
    root@bt4-pre:/pentest/wireless/wepbuster#
    root@bt4-pre:/pentest/wireless/wepbuster# aireplay -1 1 -a 00:21:1E:3D:D5:90 wlan0 -e "AT&T Back Office " -h 00:0e:3b:0e:1c:86 2>&1
    bash: aireplay: command not found
    root@bt4-pre:/pentest/wireless/wepbuster# \
    >
    root@bt4-pre:/pentest/wireless/wepbuster# cd\
    >
    root@bt4-pre:~# aireplay -1 1 -a 00:21:1E:3D:D5:90 wlan0 -e "AT&T Back Office " -h 00:0e:3b:0e:1c:86 2>&1
    bash: aireplay: command not found
    root@bt4-pre:~# aireplay-ng -1 1 -a 00:21:1E:3D:D5:90 wlan0 -e "AT&T Back Office " -h 00:0e:3b:0e:1c:86 2>&1
    18:01:46  Waiting for beacon frame (BSSID: 00:21:1E:3D:D5:90) on channel 6
    
    18:01:46  Sending Authentication Request (Open System)
    
    18:01:48  Sending Authentication Request (Open System)
    
    18:01:50  Sending Authentication Request (Open System)
    
    18:01:52  Sending Authentication Request (Open System)
    
    18:01:54  Sending Authentication Request (Open System)
    
    18:01:56  Sending Authentication Request (Open System)
    
    18:01:58  Sending Authentication Request (Open System)
    
    18:02:00  Sending Authentication Request (Open System)
    
    18:02:02  Sending Authentication Request (Open System)
    
    18:02:04  Sending Authentication Request (Open System)^C

    I stopped it at this point thinking I was having an issue I may need some assistance with....

  6. #286
    Very good friend of the forum Gitsnik's Avatar
    Join Date
    Jan 2010
    Location
    The Crystal Wind
    Posts
    851

    Default

    Quote Originally Posted by squishyalt View Post
    I don't know what the problem is - so I'll just post the konsole session output and pray that someone has an idea....
    Have a look at the lines just prior to the first error - they tell you exactly what failed.
    Still not underestimating the power...

    There is no such thing as bad information - There is truth in the data, so you sift it all, even the crap stuff.

  7. #287
    Member squishyalt's Avatar
    Join Date
    Feb 2010
    Posts
    172

    Default

    Quote Originally Posted by Gitsnik View Post
    Have a look at the lines just prior to the first error - they tell you exactly what failed.
    I had to move to home network and use neighbors for testing for the remainder of the evening...so, naturally, there is a whole new fresh hell of errors.

    Code:
    #########################################################
    Pwning "2WIRE430" (00:25:3C:E2:F2:F1)     Thu Dec 10 23:08:27 2009
    Checking for mac filtering...Trying to associate...ioctl(SIOCSIWMODE) failed: Device or resource busy
    
    ARP linktype is set to 1 (Ethernet) - expected ARPHRD_IEEE80211,
    ARPHRD_IEEE80211_FULL or ARPHRD_IEEE80211_PRISM instead.  Make
    sure RFMON is enabled: run 'airmon-ng start wlan0 <#>'
    Sysfs injection support was not found either.
    
    Can't associate. aireplay-ng died!
    #########################################################
    I don't know what the hell this means....but it would save a ton of time if i could get this automated pentest to work.
    .
    I have updated the RT73 drivers from the instructions here.

    I have run the updates for wepbuster using...

    Code:
    apt-get update #refreshes repository
    apt-get install wepbuster #installs wepbuster & all required modules.

  8. #288
    Just burned their ISO
    Join Date
    Dec 2008
    Posts
    24

    Default

    Great script thank you for making this so easy to use. After a few hours of reading this whole thread and without asking a single question yet! I managed to install perl and all the packages needed to compile and run the script properly even though I consider my self a newbie in backtrack. I ran this on my own access point "Obviously read the forum rules" with mac filtering enabled and it worked just fine. Now I have a question, it is mentioned that we can tell the script to ignore certain access points via a text file can some one post an example of how this text file is formated? Are there any special values, naming convention etc.. it needs etc....
    I will appreciate any help.

    By the way I am using BT4 with the following hardware if anyone is interested.
    Acer One Aspire
    Alfa AWUS036H

    Thanks

  9. #289
    Just burned his ISO
    Join Date
    Dec 2009
    Posts
    3

    Default

    hello ,
    i have a question. is wepbuster in backtrack 4 final??? if not how to install it .
    and have to use old methord to put in iso???

  10. #290
    Just burned his ISO
    Join Date
    Jan 2010
    Posts
    2

    Default

    Quote Originally Posted by wif1bust3r View Post
    Hi,

    I would like to announce the release of a beta version of wepbuster.


    This small utility was written for Information Security Professionals to
    aid in conducting Wireless Security Assessment. The program executes
    various utilities included in the aircrack-ng suite, a set of tools for
    auditing wireless networks, in order to obtain the WEP encryption key of
    a wireless access point. aircrack-ng can be obtained from aircrack-ng.org


    Features:

    Crack all access points within the range in one go!!
    Supports:
    - Mac address filtering bypass (via mac spoofing)
    - Auto reveal hidden SSID
    - Client-less Access Point injection
    - Shared Key Authentication
    - WEP Decloacking (future version)
    - whitelist (crack only APs included in the list)
    - blacklist (do not crack AP if it's included in the list)


    Please visit the project page at code.google.com/p/wepbuster/ where you can download the script, and find the link to the video demo.

    Please take time to read the README file so you would know what's happening behind the scene and what to expect. If you have the same setup as my testing platform, there's a good chance that the script will work without any modifications.
    i tried to watch the video but youtube says "The video has been remove by user"

    do you know where i can watch those video!! tnx

Page 29 of 30 FirstFirst ... 1927282930 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •