Results 1 to 5 of 5

Thread: Wpa

  1. #1
    Just burned his ISO
    Join Date
    Jul 2007
    Posts
    1

    Default Wpa

    ok first off the is my network.......i read up on wpa cracking....i need a connected client i have that..then im not sure....is it arp request any info will be great

  2. #2
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Quote Originally Posted by blindseer View Post
    ok first off the is my network.......i read up on wpa cracking....i need a connected client i have that..then im not sure....is it arp request any info will be great
    Holy un-intelligible question Batman, how about you take a few breaths and see if you can reformulate that into something that's understandable?
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  3. #3
    Jenkem Addict imported_wyze's Avatar
    Join Date
    Jul 2007
    Posts
    1,543

    Default

    Quote Originally Posted by blindseer View Post
    i read up on wpa cracking...... any info will be great
    I'm equally puzzled on what info you're asking about....

    If you actually "read up" on WPA cracking and aren't sure what else you need to do to set up an ideal cracking environment, then I suggest you read yup more on WPA cracking.

    *Search for Xploits wpa cracking tutorials
    dd if=/dev/swc666 of=/dev/wyze

  4. #4
    Junior Member
    Join Date
    Aug 2007
    Posts
    36

    Default

    Hmmm, I'm lost too.
    WPA cracking is pretty simple. Here's the link to Xploitz tutorial.

    http://forums.remote-exploit.org/showthread.php?t=8230

  5. #5
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Yep. The video explains it all. Ill admit though, your the first one to ever ask if it needs the -3 attack...lol

    WEP and WPA/WPA2 require 2 completely different methods to attack and crack. WEP uses aireplays -0 -1 -2 -3 -4 -5 attacks

    WPA/WPA2 only uses or needs to use the -0 attack. Its used to deauth a connected client.

    The only other time you would use the -0 attack is when your trying to do shared key fake authentication...and thats with WEP

    Just watch the video that you were instructed to view. Then, ONLY after you view it and try to crack your WPA/WPA2 network by yourself, if you have any questions..please post them INSIDE my WPA/WPA2 video thread only.

    Good luck!!
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •