Page 3 of 4 FirstFirst 1234 LastLast
Results 21 to 30 of 33

Thread: Warflying

  1. #21
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Quote Originally Posted by ats1080 View Post
    i live in the sticks and it would be nice to get range down to my pond and other areas that are well over 500 feet away and have plenty of obstical to decrease signal. its not very practical to make a house for an ap...
    You could use a pair of yagi's to connect up to a solar powered AP at your pond. There are plans out there for making a solar powered AP.
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  2. #22
    Senior Member shamanvirtuel's Avatar
    Join Date
    Mar 2010
    Location
    Somewhere in the "Ex" human right country
    Posts
    2,988

    Default

    see this one :

    http://www.luminip.com/products/spec...%204-12-06.pdf

    really nice and discreet
    Watch your back, your packetz will belong to me soon... xD

    BackTrack :
    Giving Machine Guns to Monkeys since 2006

  3. #23
    Member
    Join Date
    Jan 2007
    Posts
    117

    Default

    thats awesome, ill definately keep my eye on that. probably going to be ridiculously expesive though...

  4. #24
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Quote Originally Posted by ats1080 View Post
    thats awesome, ill definately keep my eye on that. probably going to be ridiculously expesive though...
    It shouldn't be too bad to make one. A small solar panel you can get from allelectronics.com for a few bux. Then all you need is a nice battery and a couple of voltage regulators. One to charge the battery and another to maintain a steady voltage to the AP.

    You could probably put something together for less than $60.00
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  5. #25
    Senior Member PrairieFire's Avatar
    Join Date
    Apr 2007
    Posts
    705

    Default

    Quote Originally Posted by streaker69 View Post
    I was out on I80 (PA) and I started picking up Walmart AP's from more than a mile away. The store just happened to be on a hill higher than highway so it had an advantage in it's broadcast range.

    I did say I detected it, not connected to it.
    Using just a 7.4dBi Comet omni, amplifier and Senao 2511CD+EXT2 I can pickup Walmart, HomeDepot and Lowes at Interstate speeds around the same distance. I have seen most of them have exterior external antennas along the perimeter though. The oddest thing for me is when Im at work cruising along the interstate in the middle of nowhere and picking up AP's but cannot figure out WTH they are.
    Μολὼν λαβέ - Great spirits encounter heavy opposition from mediocre minds.

  6. #26
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by PrairieFire View Post
    The oddest thing for me is when Im at work cruising along the interstate in the middle of nowhere and picking up AP's but cannot figure out WTH they are.
    I'd put money that you passed them just seconds ago... and Airodump or Kismet was just deciphering the data and able to print out the info on your screen several seconds later. It (airodump) will leave "passed by AP's" in its memory for over a minute on your screen with no real signal coming from the AP at all..... Thats been my wardriving experience anyways. I bet if you look behind you..you'll see where they are coming from..assuming your not flying at 100MPH by 'em.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  7. #27
    Senior Member PrairieFire's Avatar
    Join Date
    Apr 2007
    Posts
    705

    Default

    Quote Originally Posted by -=Xploitz=- View Post
    I'd put money that you passed them just seconds ago... and Airodump or Kismet was just deciphering the data and able to print out the info on your screen several seconds later. It (airodump) will leave "passed by AP's" in its memory for over a minute on your screen with no real signal coming from the AP at all..... Thats been my wardriving experience anyways. I bet if you look behind you..you'll see where they are coming from..assuming your not flying at 100MPH by 'em.
    Maybe some of the time but highly unlikely in some of the more remote stretches of Interstates I travel. I believe they are actually other notebook cards incorrectly configured acting as ad-hoc's. I remember vaguely a while back there was a article talking about this problem at workplaces. I have noticed some rest stops, river level monitoring station's and rolling weight stations have access points though.
    Μολὼν λαβέ - Great spirits encounter heavy opposition from mediocre minds.

  8. #28
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by PrairieFire View Post
    I believe they are actually other notebook cards incorrectly configured acting as ad-hoc's.
    I forgot about Ad-Hoc's!! Good point!
    They definitely give off info as AP's..especially in Kismet.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  9. #29
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Quote Originally Posted by PrairieFire View Post
    Maybe some of the time but highly unlikely in some of the more remote stretches of Interstates I travel. I believe they are actually other notebook cards incorrectly configured acting as ad-hoc's. I remember vaguely a while back there was a article talking about this problem at workplaces. I have noticed some rest stops, river level monitoring station's and rolling weight stations have access points though.
    You're right. It's a 'flaw/feature' that WinXP has and was reported to MS by Simple Nomad. WinXP once it disconnects from a network will begin to broadcast the SSID of the last network it was connected to in AD-HOC mode. If people join this network, they'll actually form a AD-HOC network on the IP range of 169.254.x.x. You'll see it alot at Airports.
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  10. #30
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by streaker69 View Post
    You're right. It's a 'flaw/feature' that WinXP has and was reported to MS by Simple Nomad. WinXP once it disconnects from a network will begin to broadcast the SSID of the last network it was connected to in AD-HOC mode. If people join this network, they'll actually form a AD-HOC network on the IP range of 169.254.x.x. You'll see it alot at Airports.
    Who needs that Fake AP program...,whats it called again in BT??? (probably something obvious like "Fake AP I bet!!..lol) when you got multiple bogus Ad-Hoc created networks floating around out there, and bouncing off each other... and being broadcast by other clients!!
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

Page 3 of 4 FirstFirst 1234 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •