Page 3 of 36 FirstFirst 1234513 ... LastLast
Results 21 to 30 of 359

Thread: -=Xploitz=- VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"

  1. #21
    Senior Member shamanvirtuel's Avatar
    Join Date
    Mar 2010
    Location
    Somewhere in the "Ex" human right country
    Posts
    2,988

    Default

    just trying to give you shit , exploitz, no offense
    Watch your back, your packetz will belong to me soon... xD

    BackTrack :
    Giving Machine Guns to Monkeys since 2006

  2. #22
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Your getting closer to understanding American humor and sarchasm. You should know me well enough by now Niko...that I don't ever take offense to what you say. We're cool like that.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  3. #23
    Junior Member
    Join Date
    Jan 2010
    Posts
    53

    Default

    Nice video

    Just as a hint : <when using aircrack 1.0 ivs option can be used to capture wpa handshake. ivs format has changed and now it is able to store wpa handshake.

    Another question : you have stated aircrack 1.0 can't crack essid with white spaces. So someting like 'FRITZ!Box ' won't be crackable ?
    Why do you think so ? Enclosing essid in like 'bla blup' brings all tools in suite to do the work ...
    Is there a bug in code which handles white space in a wrong way ?
    I've tested again ssid with capital letters , that one was crackable ...

  4. #24
    Junior Member
    Join Date
    Jul 2007
    Posts
    34

    Default

    Quote Originally Posted by -=Xploitz=- View Post
    Thanks beamen. have you tried this out yet? Or are you still focusing on WEP?? Just curious on how your progressing.
    Got a lot of things going on, so I don't have much time for BT now. Gotta modify my card first as well!

  5. #25
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by thetom View Post
    Nice video

    Just as a hint : <when using aircrack 1.0 ivs option can be used to capture wpa handshake. ivs format has changed and now it is able to store wpa handshake.

    Another question : you have stated aircrack 1.0 can't crack essid with white spaces. So someting like 'FRITZ!Box ' won't be crackable ?
    Why do you think so ? Enclosing essid in like 'bla blup' brings all tools in suite to do the work ...
    Is there a bug in code which handles white space in a wrong way ?
    I've tested again ssid with capital letters , that one was crackable ...
    I wasn't aware that you could use the --ivs option..but then again..why would someone want to use that option cracking WPA/WPA2?? That makes NO sense to me.

    And I was talking about having your PASSWORD (PMK) with all that stuff in it..spaces..capital letters..special letters..NOT THE ESSID!!
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  6. #26
    Junior Member
    Join Date
    Jan 2010
    Posts
    53

    Default

    Quote Originally Posted by -=Xploitz=- View Post
    I wasn't aware that you could use the --ivs option..but then again..why would someone want to use that option cracking WPA/WPA2?? That makes NO sense to me.
    well i showd up ivs option for completness. Saving disk space in batch mode is one possible use of it

    Quote Originally Posted by -=Xploitz=- View Post
    And I was talking about having your PASSWORD (PMK) with all that stuff in it..spaces..capital letters..special letters..NOT THE ESSID!!
    oh once again, being able to read carefully gives clear advantage
    Next time i won't read in a hurry ...

  7. #27
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by thetom View Post
    well i showd up ivs option for completness. Saving disk space in batch mode is one possible use of it
    I DON'T want you to think I'm picking on you thetom..ok?? But it only takes like 5-10 seconds to capture a handshake as soon as you type in

    aireplay-ng -0 1 -a XX:XX:XX:XX:XX:XX -c XX:XX:XX:XX:XX:XX ath0

    Seriously...how much disk space you think it takes to record 10 seconds of de-authing and re-authenticating?? Not very much..not worth it to me. As far as batch you talking about airolib-ng?? Cause if you are..the batch command doesn't use the PSK Handshake capture file. So can you clarify on this for me please? I'm only asking because I'm failing to see why anyone would want to use the --ivs option to save disk space when capturing a PSK?? My capture file is ONLY 89.5KB after 10 seconds of recording data ......not 89MB!!


    Quote Originally Posted by thetom View Post
    oh once again, being able to read carefully gives clear advantage
    Next time i won't read in a hurry ...
    I just edited the 1st post..it was kinda deceptive..so I see where you got that from. Thanks for pointing that out..I'm sure you wern't the only one fooled by it.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  8. #28
    Junior Member
    Join Date
    Jan 2010
    Posts
    53

    Default

    Only part of traffic you need for wpa pentesting is 4 way handshake, so why do you try to capture more traffic than this ? ivs option is straight forward for this .
    In case where deauth won't work and you need to wait for a real authentification , maybe for days , in a high traffic network you will go and count for disk space
    Well nevermind anyone can capture the way he likes best

  9. #29
    Developer balding_parrot's Avatar
    Join Date
    May 2007
    Posts
    3,399

    Default

    Quote Originally Posted by thetom View Post
    Only part of traffic you need for wpa pentesting is 4 way handshake, so why do you try to capture more traffic than this ? ivs option is straight forward for this .
    In case where deauth won't work and you need to wait for a real authentification , maybe for days , in a high traffic network you will go and count for disk space
    Well nevermind anyone can capture the way he likes best
    Why would you be waiting for days in a high traffic network for a real authentication.

    The whole point of this tutorial is that it is on your own network, in a controlled manner to teach the basic principles.

  10. #30
    Junior Member
    Join Date
    Jan 2010
    Posts
    53

    Default

    just for clarification :
    when doing pentest you can't change enviroment. You have to deal with what is up there. Anyway that was just an example where ivs might be an option. That was no offense against the video. In the video situation it doesn't matter to use ivs or not.

    Just to remember : the intention of my first posting was to give additional information about ivs option, no more no less.

    Still anybody can feel free to capture using options he likes best, no matter to me

    Any further questions ?

Page 3 of 36 FirstFirst 1234513 ... LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •