Page 4 of 10 FirstFirst ... 23456 ... LastLast
Results 31 to 40 of 97

Thread: -=Xploitz=- Tutorial: E-Z Atheros FAKED MAC Internet Connection!

  1. #31
    Developer
    Join Date
    Mar 2007
    Posts
    6,124

    Default

    I think Im gonna go home now for lunch and try,

  2. #32
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by purehate View Post
    I think Im gonna go home now for lunch and try,
    Your so easy!
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  3. #33
    Member Eristic's Avatar
    Join Date
    Aug 2006
    Posts
    188

    Default

    I'm definately trying this when I get home today. I have a damn ath0 card and could never connect to the internet either.


    EDIT: added to the wiki

  4. #34
    Member
    Join Date
    Jan 2007
    Posts
    242

    Default

    I think it's because the virtual interface ath0 is created with the original mac address. It took me a while to figure it out several months ago, kind of trial and error and lots of rtfm at the madwifi wiki. I just saw this post last night, or I'd have posted earlier.

    Have Fun

  5. #35
    Developer balding_parrot's Avatar
    Join Date
    May 2007
    Posts
    3,399

    Default

    Quote Originally Posted by theprez98 View Post
    And now we know the key to Xploitz's AP...
    And there's me thinking it was his cell/mobile phone number

  6. #36
    Senior Member PrairieFire's Avatar
    Join Date
    Apr 2007
    Posts
    705

    Default

    Not to burst your bubble but this method has been posted before here well over a year ago.
    http://forums.remote-exploit.org/sho...hlight=wlandev

  7. #37
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Cool

    Quote Originally Posted by PrairieFire View Post
    Not to burst your bubble but this method has been posted before here well over a year ago.
    http://forums.remote-exploit.org/sho...hlight=wlandev
    Nope, not busted..lol..I saw that thread like 3 months ago when I was trying to spoof my mac address. All that thread did was piss me off. IT DOESN'T WORK...and if you follow those commands..you get errors all over the place. You cant do a if config ath0 down..or when you do DHCPCD it will hang..and you cant do a ifconfig wifi0 hw ether 00:01:02:03:04:05 when it says to because you'll get a SIOCSIFHWADDR: Invalid argument error. You HAVE TO USE MACCHANGER!

    I believe after looking at this again..that this might have worked in BT1 or BT2 Beta..but My way is the only way to get it to work on BT2FINAL.

    BTW...NEW COMMANDS THAT WORK AS WELL...

    bt ~ # wlanconfig ath0 destroy
    bt ~ # macchanger --mac 00:11:22:33:44:55 wifi0
    Current MAC: 00:18:02:3a:67:14 (unknown)
    Faked MAC: 00:11:22:33:44:55 (Cimsys Inc)
    bt ~ # wlanconfig ath0 create wlandev wifi0 wlanmode managed
    ath0
    bt ~ # iwconfig ath0 essid -=Xploitz=- key 0685483761 (and no..thats not my home phone number..lol.
    bt ~ # dhcpcd ath0


    In this example I left out the ifconfig ath0 up command....no need for it. So its one less command to type or have in a script. Try it..it still works.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  8. #38
    Senior Member PrairieFire's Avatar
    Join Date
    Apr 2007
    Posts
    705

    Default

    Whoops, part of that is the old method with previous versions. My fault for drinking and surfing the web.

    Another alternative would be:
    Code:
    wlanconfig ath0 create wlandev wifi0 wlanmode sta
    Instead of:
    Code:
    wlanconfig ath0 create wlandev wifi0 wlanmode managed
    Something else I remembered
    Code:
    iwpriv ath0 authmode 1
    1 open auth.
    2 Shared
    3 802.1x auth.

    adding to theprez98's comment if 00:18:02:3a:67:14 is on wigle we would know where you live too.

  9. #39
    Moderator theprez98's Avatar
    Join Date
    Jan 2010
    Location
    Maryland
    Posts
    2,533

    Default

    Quote Originally Posted by PrairieFire View Post
    My fault for drinking and surfing the web.
    Might as well keep doing it while it's legal.
    "\x74\x68\x65\x70\x72\x65\x7a\x39\x38";

  10. #40
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Talking

    Quote Originally Posted by PrairieFire View Post
    adding to theprez98's comment if 00:18:02:3a:67:14 is on wigle we would know where you live too.
    ummm...thats my mac address for my Airlink101 AWLC4130...so SSSSUUuuurreree
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

Page 4 of 10 FirstFirst ... 23456 ... LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •