Page 2 of 5 FirstFirst 1234 ... LastLast
Results 11 to 20 of 44

Thread: So you crack the WEP - and DHCP is disabled?

  1. #11
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by kindanewbie View Post
    Edit: Read the edit

    So...hm alright i see...but what will the client do then/what will you do if there isnt any client connected?

    Are you asking me "If I were the hacker...what would I do next?"
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  2. #12
    Just burned his ISO
    Join Date
    Oct 2007
    Posts
    7

    Default

    Yes of course

    You wrote this tutorial about cracking WEP, i tried it out and was stunned by how easy it is.
    Now i dont quite get why the no-dhcp problem wasnt discussed (is this so uncommon?)

    If you wanted to freely use my internet and so on (the thing families fear), what would you do?

    (I am sorry for my insufficient knowledge about some things here)

  3. #13
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by kindanewbie View Post
    Yes of course

    You wrote this tutorial about cracking WEP, i tried it out and was stunned by how easy it is.
    Now i dont quite get why the no-dhcp problem wasnt discussed (is this so uncommon?)

    If you wanted to freely use my internet and so on (the thing families fear), what would you do?

    (I am sorry for my insufficient knowledge about some things here)
    Most people leave the DHCP service on for ease of use (convince). No one likes to manually type in all that info..let alone try to remember it all.

    If I were the hacker..I'd either do one of 2 things.

    1. Give up and move to an easier target.

    2. If there were documents on that server or network that I wanted..and I was patient enough..I'd wait until a client connected and do the chopchop (-4) attack on him and get the IP and deauth him then connect myself with a different IP than he had. Even with "limited connectivity" ...throw a hacker a bone..and hell find a way to get in if he's persistent enough.

    Remember "limited connectivity" is still connectivity. And thats all a ub3r l33t hax0r needs to do his thing.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  4. #14
    Just burned his ISO
    Join Date
    Oct 2007
    Posts
    7

    Default

    Doesnt sound bad - so if you take 5 mins of time assigning ips manually it aint that easy

    Nevertheless - you start aireplay with -4 and let it run until a client connects...
    then you death. the client and give your card an ip like the one that gets saved (?) by the program, with the tiny difference of the last number...

    Im gonna move to the only possible save reason... de-power the access point when not using it... sick...

  5. #15
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by kindanewbie View Post
    Nevertheless - you start aireplay with -4 and let it run until a client connects...
    then you death. the client and give your card an ip like the one that gets saved (?) by the program, with the tiny difference of the last number...
    More or less...yes.

    Quote Originally Posted by kindanewbie View Post
    I'm gonna move to the only possible save reason... de-power the access point when not using it... sick...
    Thats the fastest and the best way (and only 100% way) to keep out a potential hacker.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  6. #16
    Developer
    Join Date
    Mar 2007
    Posts
    6,124

    Default

    If your inside the LAN there is also always valuable information in the event logs and other such areas on the victim computers which could clue you in to the out side ip range. There is also information inside the router if you know where to look. there are also tools for dumping logs and such from certain routers. Sometimes one must be creative. I always remember that computers leave finger prints just like people. you can usually "see" where they've been.

  7. #17
    Junior Member
    Join Date
    Feb 2006
    Posts
    91

    Default

    Quote Originally Posted by -=Xploitz=- View Post
    Most people leave the DHCP service on for ease of use (convince). No one likes to manually type in all that info..let alone try to remember it all.

    If I were the hacker..I'd either do one of 2 things.

    1. Give up and move to an easier target.

    2. If there were documents on that server or network that I wanted..and I was patient enough..I'd wait until a client connected and do the chopchop (-4) attack on him and get the IP and deauth him then connect myself with a different IP than he had. Even with "limited connectivity" ...throw a hacker a bone..and hell find a way to get in if he's persistent enough.

    Remember "limited connectivity" is still connectivity. And thats all a ub3r l33t hax0r needs to do his thing.
    Can the hacker use the same IP and get full connection ? Why he want to use a different one ?

    Quote Originally Posted by kindanewbie View Post
    Doesnt sound bad - so if you take 5 mins of time assigning ips manually it aint that easy

    Nevertheless - you start aireplay with -4 and let it run until a client connects...
    then you death. the client and give your card an ip like the one that gets saved (?) by the program, with the tiny difference of the last number...

    Im gonna move to the only possible save reason... de-power the access point when not using it... sick...

    Or use WPA instead of WEP and remember to use a complicated password so it is not easily cracked.

  8. #18
    Member
    Join Date
    Nov 2007
    Posts
    220

    Default

    Quote Originally Posted by sifuconman View Post
    Can the hacker use the same IP and get full connection ? Why he want to use a different one ?
    Was going to say the same, pick a random IP that is in the same 'area' as those that exist, anything, unless things are tied down to IP addresses that is
    wtf?

  9. #19
    Just burned his ISO
    Join Date
    Feb 2008
    Posts
    1

    Smile

    Quote Originally Posted by -=Xploitz=- View Post
    Most people leave the DHCP service on for ease of use (convince). No one likes to manually type in all that info..let alone try to remember it all.

    If I were the hacker..I'd either do one of 2 things.

    1. Give up and move to an easier target.

    2. If there were documents on that server or network that I wanted..and I was patient enough..I'd wait until a client connected and do the chopchop (-4) attack on him and get the IP and deauth him then connect myself with a different IP than he had. Even with "limited connectivity" ...throw a hacker a bone..and hell find a way to get in if he's persistent enough.

    Remember "limited connectivity" is still connectivity. And thats all a ub3r l33t hax0r needs to do his thing.
    hey Xploitz , can you tell me how to find out the ip with chopchop attack ? do i have to read the created xor or cap files ? thx in advance
    btw. your tutorial videos are great

  10. #20
    Junior Member
    Join Date
    Nov 2007
    Posts
    70

    Default

    If you do not know more information about your AP (for example: you lost your password) and DHCP is disabled THIS should in most cases the easiest way to get some infos about the nework:

    -capture traffic with airodump

    -decrypt the file you caputred with airdecap and YOUR key

    -to get information about the network load the decrypted file into wireshark

    - now you should have enough networkinformation to see in what IP-range YOUR AP is working

Page 2 of 5 FirstFirst 1234 ... LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •