Page 14 of 66 FirstFirst ... 412131415162464 ... LastLast
Results 131 to 140 of 651

Thread: -=Xploitz=- VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"

  1. #131
    Senior Member shamanvirtuel's Avatar
    Join Date
    Mar 2010
    Location
    Somewhere in the "Ex" human right country
    Posts
    2,988

    Default

    Try To Deauth Broadcast........and why don't u upgrade aircrack ????

    there's plenty of script .........for that........

    by the way im preparing a script for that permitting via a menu to download either the last stable or a special revision or the last trunk.......
    will dl compile and install with an option for sql......

    it's the same codes i used in AIR and SVAAS the 2 wepcracking scripts i develop at the moment....

    i may post this standalone script today or tomorrow.......
    Watch your back, your packetz will belong to me soon... xD

    BackTrack :
    Giving Machine Guns to Monkeys since 2006

  2. #132
    Senior Member shamanvirtuel's Avatar
    Join Date
    Mar 2010
    Location
    Somewhere in the "Ex" human right country
    Posts
    2,988

    Default

    alternatively if ssid is hidden you can use an other tool to recover it :

    MDK2 (theres MDK3 now)

    You have to specify at least:
    a channel (-c), a target-mac (-t) and a character-set(in red):
    all printable (a)
    lower case (l)
    upper case (u)
    numbers (n)
    lower and upper case (c)
    lower and upper plus numbers (m)


    for exemple my ssid is not hidden but if it was it will launch bruteforce with all printable chars...........



    mdk2 rausb0 p -t 00:1A:6B:04:9E:2F -c 10 -b a
    channel set to: 10
    SSID Bruteforce Mode activated!

    Waiting for beacon frame from victim...
    Sniffer thread started

    SSID does not seem to be hidden! Found: "Livebox-a5a3"

    hope helps....
    btw card must be in monitor mode ...
    Watch your back, your packetz will belong to me soon... xD

    BackTrack :
    Giving Machine Guns to Monkeys since 2006

  3. #133
    Junior Member
    Join Date
    Jul 2007
    Posts
    37

    Default

    When i get about 500k iv , my aireplay output

    start to spit out " Notice: got a deauth/disassoc packet . Is the source mac Associated?

    what does this mean?

  4. #134
    Moderator theprez98's Avatar
    Join Date
    Jan 2010
    Location
    Maryland
    Posts
    2,533

    Default

    Quote Originally Posted by guardianx View Post
    When i get about 500k iv , my aireplay output

    start to spit out " Notice: got a deauth/disassoc packet . Is the source mac Associated?

    what does this mean?
    It probably means you need to reauthenticate/associate with the AP; or change your association timing.
    "\x74\x68\x65\x70\x72\x65\x7a\x39\x38";

  5. #135
    Junior Member
    Join Date
    Jul 2007
    Posts
    37

    Default

    Quote Originally Posted by theprez98 View Post
    It probably means you need to reauthenticate/associate with the AP; or change your association timing.
    i'm a complete newbie how would i do both?

  6. #136
    Moderator theprez98's Avatar
    Join Date
    Jan 2010
    Location
    Maryland
    Posts
    2,533

    Default

    Quote Originally Posted by guardianx View Post
    i'm a complete newbie how would i do both?
    Read up on the aircrack-ng homepage, it's all there.
    "\x74\x68\x65\x70\x72\x65\x7a\x39\x38";

  7. #137
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by guardianx View Post
    i'm a complete newbie how would i do both?

    aireplay-ng -1 0 -e teddy -a 00:14:6C:7E:40:80 -h 00:09:5B:EC:EE:F2 ath0
    Where:
    • -1 means fake authentication
    • 0 reassociation timing in seconds
    • -e teddy is the wireless network name
    • -a 00:14:6C:7E:40:80 is the access point MAC address
    • -h 00:09:5B:EC:EE:F2 is our card MAC addresss
    • ath0 is the wireless interface name
    Success looks like:
    18:18:20 Sending Authentication Request
    18:18:20 Authentication successful
    18:18:20 Sending Association Request
    18:18:20 Association successful :-) Or another variation for picky access points:
    aireplay-ng -1 6000 -o 1 -q 10 -e teddy -a 00:14:6C:7E:40:80 -h 00:09:5B:EC:EE:F2 ath0 Where:
    • 6000 - Reauthenticate very 6000 seconds. The long period also causes keep alive packets to be sent.
    • -o 1 - Send only one set of packets at a time. Default is multiple and this confuses some APs.
    • -q 10 - Send keep alive packets every 10 seconds.
    Success looks like:
    18:22:32 Sending Authentication Request
    18:22:32 Authentication successful
    18:22:32 Sending Association Request
    18:22:32 Association successful :-)
    18:22:42 Sending keep-alive packet
    18:22:52 Sending keep-alive packet
    # and so on.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  8. #138
    Just burned his ISO
    Join Date
    Aug 2007
    Posts
    13

    Default

    finally, after trying again and again, i managed to get the wusb54g v4 to work with live bt2.......thanks for the tutorial Xploitz.....and also to shaman for the tips on which driver....but still i have to installed two driver , aspj rt2570 1.6.1 and rt73 1.1.0 ....only load the rt73 .....unplug usb and the replug.......and so on......

  9. #139
    Junior Member
    Join Date
    Feb 2006
    Posts
    91

    Default

    Hi Xploitz

    Thanks for the interesting video.

    I am a complete noobie in Linux and I do not understand the following command in your video . Hope you can spend a little of your time to explain to me

    Airodump-ng –c –w xploitz --bssid 00:18:F8:85:F26 ath0


    My Questions :

    According to your video xploitz in the command line above is supposed to be the iv capture file. Where is this file stored ? Is it stored on the computer or CD ?

    If I am not installing the Backtrack in my computer but is booting up my computer directly from Backtract live CD then how and where do I store the iv capture file ? How will the new command look like ?

    How do we use the iv capture file in aircrack ? I mean how to write the command so that aircrack knows where to locate the iv capture file.

    Thank you.

  10. #140
    Junior Member
    Join Date
    Jul 2007
    Posts
    37

    Default

    should be in /root

Page 14 of 66 FirstFirst ... 412131415162464 ... LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •