ok first off the is my network.......i read up on wpa cracking....i need a connected client i have that..then im not sure....is it arp request any info will be great
A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.
If you actually "read up" on WPA cracking and aren't sure what else you need to do to set up an ideal cracking environment, then I suggest you read yup more on WPA cracking.
*Search for Xploits wpa cracking tutorials
dd if=/dev/swc666 of=/dev/wyze
Yep. The video explains it all. Ill admit though, your the first one to ever ask if it needs the -3 attack...lol
WEP and WPA/WPA2 require 2 completely different methods to attack and crack. WEP uses aireplays -0 -1 -2 -3 -4 -5 attacks
WPA/WPA2 only uses or needs to use the -0 attack. Its used to deauth a connected client.
The only other time you would use the -0 attack is when your trying to do shared key fake authentication...and thats with WEP
Just watch the video that you were instructed to view. Then, ONLY after you view it and try to crack your WPA/WPA2 network by yourself, if you have any questions..please post them INSIDE my WPA/WPA2 video thread only.
[CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
[URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
[URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
[URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]
[URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]