Results 1 to 8 of 8

Thread: POLL: Besides Aircrack-ng!!

Hybrid View

  1. #1
    Junior Member
    Join Date
    Apr 2007
    Posts
    72

    Default POLL: Besides Aircrack-ng!!

    Everybody agrees the aircrack-ng group of commands is outstanding. But with 280 other software programs on BT2, what is the next useful program or programs for BT2 users?

    Can the forum participants comment? What is your favorite non aircrack-ng program and what do you use it for?

    I would like to experiement with other programs but would like to know where to start .... outside of the aircrack-ng series.

    Thanks,

    Alacrity


  2. #2
    Developer
    Join Date
    Mar 2007
    Posts
    6,126

    Default

    the next thing to do is a security scan to find a availible exploit. Personally my favorite tool so far is dsniff. we were disscussing it it another thread if you have a old dell lap top or somthing else with dsniff running on a wireless network you can pick up all sorts of juicy Info. there was no mistake in the sub grouping of the menu in bt. Learn the tools in order . I have spent tons of time reasearching and testing each tool and i fear i still have only scratched the surface

  3. #3
    Junior Member
    Join Date
    Apr 2007
    Posts
    72

    Default

    Thanks for that input! I have two other old laptops just waiting to jump into the fray.

    Alacrity

  4. #4
    Developer
    Join Date
    Mar 2007
    Posts
    6,126

    Default

    theoretical attack:

    FIND WIRELESS TARGET- kismet

    RECOVER KEY-aircrack

    FIND ALL HOSTS ON NETWORK/AND OPEN PORTS-NMAP

    SECURITY SCAN-GFI LANGUARD SCANNER{OR NESSUS IF YOU WANT TO INSTALL IT}
    operating system finger print- forgot what i use

    then:
    CHOICE A: "FORGET YOUR LAPTOP RUNNING DSNIFF" in the ceiling of the mens room when you went to the bath room at the target location.
    CHOICE b: google your ass of and try to find a exploit for python or metasploit. both included in bt. this is a theoretical attack senario and was meant to be educational and in no way encourage any one to break the law.

  5. #5
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by purehate View Post
    theoretical attack:

    FIND WIRELESS TARGET- kismet

    RECOVER KEY-aircrack

    FIND ALL HOSTS ON NETWORK/AND OPEN PORTS-NMAP

    SECURITY SCAN-GFI LANGUARD SCANNER{OR NESSUS IF YOU WANT TO INSTALL IT}
    operating system finger print- forgot what i use

    then:
    CHOICE A: "FORGET YOUR LAPTOP RUNNING DSNIFF" in the ceiling of the mens room when you went to the bath room at the target location.
    CHOICE b: google your ass of and try to find a exploit for python or metasploit. both included in bt. this is a theoretical attack senario and was meant to be educational and in no way encourage any one to break the law.
    This is EXACTLY what I was talking about. This IS WHY WE NEED AN ESTABLISHED MEMBERS AREA! No offense intended to purehate, as we have developed a type of friendship here on the board, but these topics should NOT be talked about freely and openly to the general public. Especially when you say........
    Quote Originally Posted by purehate View Post
    this is a theoretical attack senario and was meant to be educational and in no way encourage any one to break the law.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  6. #6
    Developer
    Join Date
    Mar 2007
    Posts
    6,126

    Default

    your right xploitz we should have a private forum but the reality is that for a succsesfull penn test we must talk and think as if we are criminals. Ive never got in trouble for what I think feel or Belive only for what I have done in my actions. If this was a racist white power site we could talk about burning churches and lynching people and it would be fine because we are not acting on it. So I guess we will not talk about what could happen to our companys if some idiot from the idiot corner leauge learned how to use the powerful weapon they have. What I would do instead is start forums on how to protect agaist these tools as well as use them. no offense taken my friend

    plus it was like 4 am were i am i had a few adult beverages so I apologize if I broke any unwritten rules. It will not happen again

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •