Page 3 of 3 FirstFirst 123
Results 21 to 29 of 29

Thread: ip address spoofing with proxies

  1. #21
    Just burned his ISO
    Join Date
    Mar 2010
    Posts
    2

    Default

    i already spoofed my mac address, but still cannot associate..i'm using the same mac address with the client but still can't associate.how can i associate with the ap again?i'm not the owner for the wireless ap...

  2. #22
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Quote Originally Posted by r1361 View Post
    i already spoofed my mac address, but still cannot associate..i'm using the same mac address with the client but still can't associate.how can i associate with the ap again?i'm not the owner for the wireless ap...
    Oh, so you're nothing but a goddamn thief then? Well, good for you for admitting it in a public forum. Now, how do you like your ass reaming, with or without walnuts?

    You should probably go now, since you're going to be banned shortly.
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  3. #23
    Moderator theprez98's Avatar
    Join Date
    Jan 2010
    Location
    Maryland
    Posts
    2,533

    Default

    Quote Originally Posted by r1361 View Post
    i already spoofed my mac address, but still cannot associate..i'm using the same mac address with the client but still can't associate.how can i associate with the ap again?i'm not the owner for the wireless ap...
    Clearly, you didn't read the very simple forum rules, among them:
    Quote Originally Posted by Forum Rules
    * We do not condone any illegal activity at all
    * Do not post about breaking into networks that do not belong to you and for which you have no permissions
    * Posts like - "Oooh! look!! I've cracked my neighbours wireless AP" or "How do I hack a network!?" are not needed here, thanks.
    we only have five rules, and you managed to break 3 of them in the course of one thread. Go ask your question somewhere else, since you have officially been banned here (and I didn't even get to do it).
    "\x74\x68\x65\x70\x72\x65\x7a\x39\x38";

  4. #24
    Developer balding_parrot's Avatar
    Join Date
    May 2007
    Posts
    3,399

    Default

    Forgot to say, don't let the door hit you in the ass on the way out.

  5. #25
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    I miss all the phun!! Next time save me some fresh fish to chow down on guys!!!
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  6. #26
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Quote Originally Posted by -=Xploitz=- View Post
    I miss all the phun!! Next time save me some fresh fish to chow down on guys!!!
    Fish heads, fish heads,
    rolly polly fish heads
    fish heads, fish heads
    eat them up, yum!



    http://www.youtube.com/watch?v=VXY8cWYdQog
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  7. #27
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    OMFG!! Why in the hell did you post that damn music videos link up! That was Sooooo gross! Now that damn songs stuck in my head,and my 7 year old daughter won't quit singing fish head, fish head over and over....thanks streaker!
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  8. #28
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Quote Originally Posted by -=Xploitz=- View Post
    OMFG!! Why in the hell did you post that damn music videos link up! That was Sooooo gross! Now that damn songs stuck in my head,and my 7 year old daughter won't quit singing fish head, fish head over and over....thanks streaker!
    Happy to help.
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  9. #29
    Just burned his ISO
    Join Date
    Sep 2009
    Posts
    1

    Default

    Hi All,

    I have a slightly more valid reason for wanting to spoof an IP.... I live outside the US and upon clicking Leno ,Letterman or Rolling Stone it detects my IP as being from away....and won't let me watch videos' of the shows....

    I would like to be able to , on occasion, pass my time, with a little dose of the current comedy , etc.....

    thanks,
    Rhunter

Page 3 of 3 FirstFirst 123

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •