Page 47 of 66 FirstFirst ... 37454647484957 ... LastLast
Results 461 to 470 of 651

Thread: -=Xploitz=- VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"

  1. #461
    Just burned his ISO
    Join Date
    Feb 2008
    Posts
    1

    Default

    No Client WEP cracking?

    I think I'm missing something here.

    So where does the ARP packet emanate from for the aireplay-ng -3 option to replay?

    Can you explain please?

  2. #462
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by fido13uk View Post
    well i give in i still cant get this video tutorial i logged in went to last page like you said and when i click for video just reloads the page can anyone give me a direct link ?
    Its a link inside post #1.

    Heres the link for ya. >>
    Code:
    http://s32.photobucket.com/player.swf?refURL=http://s32.photobucket.com/albums/d25/Pirate1976/%3faction=view&current=8fb7a370.flv/&file=http://vid32.photobucket.com/albums/d25/Pirate1976/8fb7a370.flv&fs=1&os=1&ap=1
    Quote Originally Posted by ReckaH View Post
    I was looking for the tutorials, but when i click the link it just reloads the same page

    Then i tried the other link on photobucket, but the file is not there.

    Can any of you please help me to get the video tuts. Thanks


    Greetzz Kevin
    See above post in this quote.

    Quote Originally Posted by badoing View Post
    No Client WEP cracking?

    I think I'm missing something here.

    So where does the ARP packet emanate from for the aireplay-ng -3 option to replay?

    Can you explain please?
    Sure thing.


    You see badoing, the name of the -3 attack is "ARP Request Replay Attack"

    Here, as taken off the aircrack-ng main site>>>>

    Quote Originally Posted by Aircrack-ng
    Description

    The classic ARP request replay attack is the most effective way to generate new initialization vectors (IVs), and works very reliably. The program listens for an ARP packet then retransmits it back to the access point. This, in turn, causes the access point to repeat the ARP packet with a new IV. The program retransmits the same ARP packet over and over. However, each ARP packet repeated by the access point has a new IVs. It is all these new IVs which allow you to determine the WEP key.

    What is ARP?

    ARP is address resolution protocol: A TCP/IP protocol used to convert an IP address into a physical address, such as an Ethernet address. A host wishing to obtain a physical address broadcasts an ARP request onto the TCP/IP network. The host on the network that has the address in the request then replies with its physical hardware address.
    ARP is the foundation of many attacks in the aircrack-ng suite. These links will allow you to learn more about ARP:
    Now if that doesn't satisfy you, I'll try to break it worn as simple as possible.>>>>

    The vast majority (if not all) AP's / routers frequently "spit out" an ARP request every 5-30 minutes. All its doing is trying to find outif and whatthe mac address is of the / any connected client on the network is. And if it gets no responce, I believe it flushes out its ARP catch and sends out another ARP request until "someone" (like you) gives the ARP request a MAC address to play with.

    I have had literally ONLY the power cord connected to my AP (no Ethernet cords) and I have generated an ARP with the -3 attack. Now thats true clientless WEP cracking at its best.


    The -3 attack replays data that is being broadcast from the AP, but if its not broadcasting the right packet....you just have to wait until it does....or associate with your AP via another comp on the lan and ping something like....

    ping 111.111.111.111

    to generate an ARP request / IV.


    I hope this helps you understand ARP better, but I think you need to research the protocols on how Address Resolution Protocol works to get a greater understanding. And no, I don't know everything on ARP, I only know just enough to crack Da WEP.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  3. #463
    Junior Member
    Join Date
    Feb 2010
    Posts
    25

    Default

    Well hello all
    First, you guy's run a great site here.

    I was wondering where i could see the videotutoirals.
    Because when i use the link to photobucket i get a message that there is now such file there.

    I would really like to see the video's, mabye some one could post a working link.

    Thanks in advance.

    Greetz

    Kevin

  4. #464
    Member
    Join Date
    Nov 2007
    Posts
    220

    Default

    Quote Originally Posted by -=Xploitz=- View Post
    Good card from what I hear. I wonder if you can mod it for an external antenna??

    HHHmmm...
    Yes this card is brilliant, now cracked my home network and the work one (as Ive said before Im admin and i have the key already) and its brilliant.

    Tried to pull it apart earlier to look at an antenna mod but scared of breaking it lol, will look around to see if its worth it.

    Next step redo the MSF work put them together then do the presentation

    (PS had problem last night where after 10 mins it only got 8 IV's, did it again and same, done it again today and got 400,000 lol... bizzare).

    Anyway, another happy customer lol, many thanks for tut Xploitz
    wtf?

  5. #465
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by ReckaH View Post
    Well hello all
    First, you guy's run a great site here.

    I was wondering where i could see the videotutoirals.
    Because when i use the link to photobucket i get a message that there is now such file there.

    I would really like to see the video's, mabye some one could post a working link.

    Thanks in advance.

    Greetz

    Kevin
    Their all in post #1 of all my tutorials. And their all working just fine.



    Quote Originally Posted by Andy90 View Post

    Anyway, another happy customer lol, many thanks for tut Xploitz
    LOL, customer?? What did I charge you? A beer is my usual fee
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  6. #466
    Member
    Join Date
    Nov 2007
    Posts
    220

    Default

    Quote Originally Posted by -=Xploitz=- View Post
    A beer is my usual fee
    Lol its what I usually charge my mates too! and to be honest its a good beer well bought
    wtf?

  7. #467
    Junior Member
    Join Date
    Feb 2006
    Posts
    91

    Default

    Quote Originally Posted by -=Xploitz=- View Post
    Good card from what I hear. I wonder if you can mod it for an external antenna??

    HHHmmm...

    Here's the link to mod this card.

    hxxp://crystalcove.ath.cx/wg511tmod/

  8. #468
    Junior Member
    Join Date
    Feb 2008
    Posts
    36

    Default

    Nice work. I had tried it in class with my professor, but wasn't able to get it to work. I think its because the USB WNIC he let me borrow wasn't capable of injection.

    I'm probably going to try it on my own network and do a write up for my netsec class. I know my WMP11 card can do injection.

  9. #469
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by GunMonkey View Post
    Nice work. I had tried it in class with my professor, but wasn't able to get it to work. I think its because the USB WNIC he let me borrow wasn't capable of injection.

    I'm probably going to try it on my own network and do a write up for my netsec class. I know my WMP11 card can do injection.
    If your professor let you try it with a borrowed USB..then surely he will let you bring your laptop with working card in and try it out? Ask him. I'm sure he will let you. My professors let me,..and they were all shocked how quickly I did it.....

    They also made me promise never to bring my laptop back into their class in fear of me hacking the grades...lol (No they weren't serious.) But I told them that hackers needn't be at the school to do that if they wanted to, that they could just do it from the comfort of their own home.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  10. #470
    Just burned his ISO
    Join Date
    Feb 2008
    Posts
    10

    Default

    Hey guys, this is my first post here and I, like the guy above me, would like to congratulate all of you for the amazing site you have running here.

    I'd also like the personally thanks -=Xploitz=- for making all of these great video tutorials, for helping beginners like me.

    I have a few questions, naturally, and hopefully they won't be too much of a burden for you.

    1. So for a USB Wireless adapter you recommend the Alfa 500mW USB?
    2. When is the DEAUTH attack needed, and why do I see it used in some tutorials/videos and not in others?
    3. I've successfully manage to crack my own WEP key at home, which I was very excited about, and I thought I'd take a crack at my school's key. When I tried the fake authentication attack at my school however, it failed, and I wasn't sure why. Is it necessary for that attack to be successful in order to crack the key?
    4. I also noticed while testing things at school, that the # of data packets that were usually very low at my house, were increasing fairly rapidly, without me doing much of anything. So that led me to wondering if I even needed to run aireplay, and instead, just wait for the data packets to collect, lol. I did run aireplay though, and got multiple ARP requests without the fake authentication being successful. I was using BT3 beta at the time and it said something about, open network...or open connection. I can't remember at the moment but it said that in parentheses right after "Sending Authentication Request". Any significance?
    5. And finally, when I finally did get around to attempting the crack, BT3 Beta kept crashing so I used BackTrack 2, and I left it running for about 5 minutes. At my house it only took a few seconds. Is there any way to speed up the process, or should I just wait until it cracks it? Oh, and is there a way to figure out if the encryption is 64 bit or 128 bit? ^_^

    Thanks for all the help guys. Great community here.

    Regards,

Page 47 of 66 FirstFirst ... 37454647484957 ... LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •