Page 2 of 4 FirstFirst 1234 LastLast
Results 11 to 20 of 31

Thread: Hacking WPA-2 Key - Evil Twin Method (No Bruteforcing)

  1. #11
    Just burned his ISO deathcorps's Avatar
    Join Date
    Dec 2010
    Posts
    12

    Default Re: 回复: Hacking WPA-2 Key - Evil Twin Method (No Bruteforcing)

    I have posted the original article with links on my website:

    http://technicdynamic.com/2011/12/ha...no-bruteforce/

    Note that however you should still conduct your recon,
    as that's your basis for making this attack realistic.

  2. #12
    Member longjidin's Avatar
    Join Date
    Feb 2010
    Location
    Kg Lengkong to Bukit Lada
    Posts
    93

    Default Re: Hacking WPA-2 Key - Evil Twin Method (No Bruteforcing)

    nice method .........!! can this method work on others AP with WPA/WPA2??? but you did a good job


    happy hunting!!

  3. #13
    Just burned his ISO deathcorps's Avatar
    Join Date
    Dec 2010
    Posts
    12

    Default Re: Hacking WPA-2 Key - Evil Twin Method (No Bruteforcing)

    Yes, this is intended for WPA/WPA2...
    We get the key by tricking the victim!

    Thanks for the feedback & be safe! ;]

  4. #14
    Just burned his ISO
    Join Date
    Dec 2011
    Posts
    3

    Default Re: Hacking WPA-2 Key - Evil Twin Method (No Bruteforcing)

    great video. very useful.
    can you just explane steps. do I create database first, or create while working??
    and, do I need to be connected to the internet to instal dhcp3-server or not??

  5. #15
    Just burned his ISO deathcorps's Avatar
    Join Date
    Dec 2010
    Posts
    12

    Default Re: Hacking WPA-2 Key - Evil Twin Method (No Bruteforcing)

    Just like any other attack, you should be comfortable before execution.
    Set up apache, make sure it works nicely with the database; have your "service page" ready.

    Then go by steps.

    If you're a beginner don't try to do everything at once because it's a lot,
    and it's hard to do things right if you don't understand what you're doing.

    Try covering each one of the 4 steps individually,
    once comfortable, put them all together.

  6. #16
    Just burned his ISO
    Join Date
    Dec 2011
    Posts
    3

    Default Re: Hacking WPA-2 Key - Evil Twin Method (No Bruteforcing)

    yes i'm beginner but i'll take it slow. i know a bit of linux but very little. i'm here to learn.
    tnx for video. if any problem appears i'll ask

  7. #17
    Just burned his ISO
    Join Date
    Dec 2010
    Posts
    2

    Default Re: Hacking WPA-2 Key - Evil Twin Method (No Bruteforcing)

    What prevents us from faking an AP with exactly the same SSID and then capturing the WPA key when the victim's computer try to automatically connect?

    Of course I don't know how to do it, but it seems to be an easy idea, so I'd like to know if someone knows the answer.

    Thanks in advance

  8. #18
    Just burned his ISO deathcorps's Avatar
    Join Date
    Dec 2010
    Posts
    12

    Default Re: Hacking WPA-2 Key - Evil Twin Method (No Bruteforcing)

    Hey iRiKi!
    I'm glad you bring that up, because that was the original idea behind the attack. =)
    However, when trying to implement it, I realized (after looking through many packets on wireshark) that the password works much like a hash.
    The router simply compares the two "hashes" for a match.
    All of this would boil down to the same method already known of capturing the 4-way handshake and bruteforcing/wordlist the password.
    Sorry if my explanation doesn't make too much sense, but if you run Wireshark & analyze the process you will see what I'm talking about...
    Appreciate the feedback. ;]

  9. #19
    Junior Member
    Join Date
    Jan 2010
    Posts
    47

    Default Re: Hacking WPA-2 Key - Evil Twin Method (No Bruteforcing)

    Have developed this method since the old times.(hadn't posted since ages...)
    Some personal tweaks.
    For de-authenticating use airdrop-ng it has far more options and its perfect for the situation.(you can de-authenticate everyone that connects to a certain access-point automatically without your intervention)
    Then i personally try to guess the router vendor by the mac or by the ssid(mostly here ssid's are standard) and use a modified router page as a key enter page.Justifying everything with a router firmware update going on and the need to enter the key to continue navigation.

  10. #20
    Just burned his ISO
    Join Date
    Feb 2010
    Posts
    1

    Default Re: Hacking WPA-2 Key - Evil Twin Method (No Bruteforcing)

    Hi Deathcrops, ty for this method...really great..! i want you u somethink.. You can add a higher-resolution video for me? Thanks in advance .

Page 2 of 4 FirstFirst 1234 LastLast

Similar Threads

  1. Ejacoolas, the Evil Java Applet COOL Automation Script
    By torpedo48 in forum BackTrack 5 General Topics
    Replies: 5
    Last Post: 10-07-2012, 12:08 PM
  2. Help about bruteforcing url
    By alkado in forum Beginners Forum
    Replies: 0
    Last Post: 06-29-2010, 04:45 AM
  3. USB HDD: Install with USB method or HDD method?
    By floepie in forum Beginners Forum
    Replies: 0
    Last Post: 03-12-2010, 12:17 AM
  4. Could apps like download managers be evil
    By kutchbhi in forum OLD General IT Discussion
    Replies: 2
    Last Post: 01-04-2010, 07:40 AM
  5. Evil modern hardware - C2D wireless, 5100AGN
    By RageLtMan in forum OLD BackTrack 3 Final
    Replies: 0
    Last Post: 11-21-2008, 05:17 PM

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •