Page 3 of 4 FirstFirst 1234 LastLast
Results 21 to 30 of 37

Thread: How WPA functions? TKIP?

  1. #21
    Jenkem Addict imported_wyze's Avatar
    Join Date
    Jul 2007
    Posts
    1,543

    Default

    Quote Originally Posted by ryanfx View Post
    On second thought, if you want, I could always write a tutorial sometime this weekend on getting one setup and throw it on over your way to see if its followable. Let me know.
    Would be KooL if you could post a quick tut with conf files attached for PEAP/TLS
    dd if=/dev/swc666 of=/dev/wyze

  2. #22
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by swc666 View Post
    Would be KooL if you could post a quick tut with conf files attached for PEAP/TLS

    I second that..
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  3. #23
    Senior Member DaKahuna's Avatar
    Join Date
    Jan 2010
    Posts
    103

    Default

    Quote Originally Posted by -=Xploitz=- View Post
    Only asking because I wonder if companies use this free radius or if they pay a provider..and if they do pay a provider, does it use the same principals?
    We use RADIUS with our wireless solution. It is not FreeRADIUS but rather a product known as "Steel Belted RADIUS". While I would not claim to have the skills that a lot of the members here have with wireless, I have attempted off and on for over two years to crack the system and have not been able to do so.

    It is my guess that the reasons most major corporations do not use more open source based soluitons like FreeRADIUS is that corporations need the safety blanket of having someone to call when things go wrong. Not a lot, including the one I work for, are willing to put their information in the hands of the open source community.

  4. #24
    Senior Member
    Join Date
    Jan 2006
    Posts
    1,334

    Default

    Quote Originally Posted by -=Xploitz=- View Post
    I second that..

    and BTW..I wasn't intending to insult you with the talent comment. Poor choice of wording on my part.
    Take a look at Zeroshell.
    May be of interest for near "instant" attacking experiments?

    http://www.zeroshell.net/eng/

  5. #25
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Quote Originally Posted by DaKahuna View Post

    It is my guess that the reasons most major corporations do not use more open source based soluitons like FreeRADIUS is that corporations need the safety blanket of having someone to call when things go wrong. Not a lot, including the one I work for, are willing to put their information in the hands of the open source community.
    I agree with that, as that is what I have seen as well. When something bad happens, they want to have someone from the company onsite the day before something bad happened. With OSS, most times you just can't have that happen.

    I run some OSS Software at my place, but nothing that would be considered mission critical.
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  6. #26
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by DaKahuna View Post
    We use RADIUS with our wireless solution. It is not FreeRADIUS but rather a product known as "Steel Belted RADIUS". While I would not claim to have the skills that a lot of the members here have with wireless, I have attempted off and on for over two years to crack the system and have not been able to do so.

    It is my guess that the reasons most major corporations do not use more open source based soluitons like FreeRADIUS is that corporations need the safety blanket of having someone to call when things go wrong. Not a lot, including the one I work for, are willing to put their information in the hands of the open source community.
    Now that makes sense. So would it be more of a challenge to crack this FreeRadius or this "Steel Belted RADIUS"..I'm just gonna guess and say the later of the 2. Radius is going to be my new project when I get the time to try it out. But for now..I can play with the Free radius without breaking any laws correct?? Just want to make sure.

    Quote Originally Posted by Re@lity View Post
    Take a look at Zeroshell.
    May be of interest for near "instant" attacking experiments?

    http://www.zeroshell.net/eng/
    A quote from your link...

    It is available in the form of Live CD or Compact Flash image and you can configure and administer it using your web browser.

    Thats about as easy as its gonna get it looks like.

    Thanks for that link Re@lity. I bookmarked it for later use once I get some time to play with it. Seems all pretty much straight forward, and lots of open source components and a wget for guaranteeing automatic updating with the patches.

    Thanks again boss.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  7. #27
    Senior Member DaKahuna's Avatar
    Join Date
    Jan 2010
    Posts
    103

    Default

    Quote Originally Posted by -=Xploitz=-
    Now that makes sense. So would it be more of a challenge to crack this FreeRadius or this "Steel Belted RADIUS"..I'm just gonna guess and say the later of the 2. Radius is going to be my new project when I get the time to try it out.
    I am not sure there is much of a difference but have not investigated to see. Might be worth asking around whether one has been determined/proven to be more secure than the other.

    Quote Originally Posted by -=Xploitz=-
    But for now..I can play with the Free radius without breaking any laws correct?? Just want to make sure.
    Yes, as long as it is your network and RADIUS server.

  8. #28
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by DaKahuna View Post
    I am not sure there is much of a difference but have not investigated to see. Might be worth asking around whether one has been determined/proven to be more secure than the other.



    Yes, as long as it is your network and RADIUS server.
    I know that..I was referencing the "free radius..since someone else was hosting it.

    Would it be my network and radius server..or just my network and this company's free radius's server?? ..Thats the problem I'm having understanding. I don't want to push any gray area with this. If it was definitely my radius server even though its free radius...then of course I could legally crack it. But if I'm just "using/borrowing" free radius's radius server..then I think it would be illegal for me to "probe" it.

    I hope I made sense to you guys..as I know very little on radius servers. Never even seen one set up.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  9. #29
    Developer balding_parrot's Avatar
    Join Date
    May 2007
    Posts
    3,399

    Default

    You actually download it and run it on your own system, so there is no problem.

  10. #30
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by balding_parrot View Post
    You actually download it and run it on your own system, so there is no problem.
    I see. Thanks b_p.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

Page 3 of 4 FirstFirst 1234 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •