Page 1 of 2 12 LastLast
Results 1 to 10 of 11

Thread: Would be WPA/WPA2-PSK easy in the future such as WEP is today?

  1. #1
    Just burned his ISO mcrete's Avatar
    Join Date
    Mar 2008
    Posts
    19

    Default Would be WPA/WPA2-PSK easy in the future such as WEP is today?

    Someone can break his wep in 6 minutes with Backtrack. Backtrack 4??? Could the next release break our WPA such as easy?

  2. #2
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by mcrete View Post
    Someone can break his wep in 6 minutes with Backtrack. Backtrack 4??? Could the next release break our WPA such as easy?
    Backtrack 4???

    Maybe, but were still working on BT3 at the moment.

    WPA / WPA2 currently is incapable of being cracked in the same manner as WEP. WPA salts the ESSID and the passphrase together giving it a very unique algorithm which makes decrypting the passphrase almost impossible. ATM...there are WAY to many possibilities and combinations of letters / characters to purely Brute Force a WPA / WPA2 key. It could take an eternity to crack the passphrase>>>

    *&(^%E@TUGIDHGJ*^*&^ ^DWY*&DP()&#!%45ijfrIHDOyhP*WDWWJD??);";.,?..NybVu y^&*b itd87t34


    But yes...it would be nice to see the passphrase come up one digit at a time as its being cracked>>>

    10 seconds>>> X
    1 minute>>>>>> P
    1:30>>>>>>>>>> L
    2:23>>>>>>>>>>>O
    4:00>>>>>>>>>>>>I
    4:13>>>>>>>>>>>>>T
    4:57>>>>>>>>>>>>>>Z
    5:11>>>>>>>>>>>>>>>!

    Passphrase is XPLOITZ!
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  3. #3
    Just burned his ISO mcrete's Avatar
    Join Date
    Mar 2008
    Posts
    19

    Default

    Quote Originally Posted by -=Xploitz=- View Post
    Backtrack 4???

    Maybe, but were still working on BT3 at the moment.

    WPA / WPA2 currently is incapable of being cracked in the same manner as WEP. WPA salts the ESSID and the passphrase together giving it a very unique algorithm which makes decrypting the passphrase almost impossible. ATM...there are WAY to many possibilities and combinations of letters / characters to purely Brute Force a WPA / WPA2 key. It could take an eternity to crack the passphrase>>>

    *&(^%E@TUGIDHGJ*^*&^ ^DWY*&DP()&#!%45ijfrIHDOyhP*WDWWJD??);";.,?..NybVu y^&*b itd87t34


    But yes...it would be nice to see the passphrase come up one digit at a time as its being cracked>>>

    10 seconds>>> X
    1 minute>>>>>> P
    1:30>>>>>>>>>> L
    2:23>>>>>>>>>>>O
    4:00>>>>>>>>>>>>I
    4:13>>>>>>>>>>>>>T
    4:57>>>>>>>>>>>>>>Z
    5:11>>>>>>>>>>>>>>>!

    Passphrase is XPLOITZ!
    Interesting! WPA encryption is becoming more and more popular nowadays, cause is the most secure encryption!!!

  4. #4
    Developer balding_parrot's Avatar
    Join Date
    May 2007
    Posts
    3,399

    Default

    Quote Originally Posted by -=Xploitz=- View Post
    *&(^%E@TUGIDHGJ*^*&^ ^DWY*&DP()&#!%45ijfrIHDOyhP*WDWWJD??);";.,?..NybVu y^&*b itd87t34
    Time to change your password ?

  5. #5
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by mcrete View Post
    Interesting! WPA encryption is becoming more and more popular nowadays, cause is the most secure encryption!!!
    And it is becoming more of a challenge. I like seeing WPA / WPA2 networks pop up that use to be WEP protected. I have converted several clients from using WEP to WPA / WPA2, and educated them on using a STRONG passphrase...yet some still use the minimum 8 character..all lowercase....regular old words.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  6. #6
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by balding_parrot View Post
    Time to change your password ?

    <Ignores b_p's little comment.
    \ /
    < ~ ~ >
    \_0_/



    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  7. #7
    Just burned his ISO mcrete's Avatar
    Join Date
    Mar 2008
    Posts
    19

    Default

    Quote Originally Posted by -=Xploitz=- View Post
    And it is becoming more of a challenge. I like seeing WPA / WPA2 networks pop up that use to be WEP protected. I have converted several clients from using WEP to WPA / WPA2, and educated them on using a STRONG passphrase...yet some still use the minimum 8 character..all lowercase....regular old words.
    Here in Crete all the people have their networks unlocked.. 10% has Wep key protection and 1% WPA/WPA2 protection!!

  8. #8
    Very good friend of the forum hhmatt's Avatar
    Join Date
    Jan 2010
    Posts
    660

    Default

    Quote Originally Posted by mcrete View Post
    Here in Crete all the people have their networks unlocked.. 10% has Wep key protection and 1% WPA/WPA2 protection!!
    Where do you get these figures?

    Its not that uncommon for people who know very little about computers/networks to leave something like a wireless network unencrypted.

    And it is becoming more of a challenge. I like seeing WPA / WPA2 networks pop up that use to be WEP protected. I have converted several clients from using WEP to WPA / WPA2, and educated them on using a STRONG passphrase...yet some still use the minimum 8 character..all lowercase....regular old words.
    Scary!

    I wrote a password creator program in VB a while back you wanna take a look at it?

  9. #9
    Just burned his ISO mcrete's Avatar
    Join Date
    Mar 2008
    Posts
    19

    Default

    Quote Originally Posted by hhmatt81 View Post
    Where do you get these figures?

    Its not that uncommon for people who know very little about computers/networks to leave something like a wireless network unencrypted.
    The encrypted networks here are WEP encrypted more. WPA is not so usual.

  10. #10
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by hhmatt81 View Post
    Where do you get these figures?

    Its not that uncommon for people who know very little about computers/networks to leave something like a wireless network unencrypted.



    Scary!

    I wrote a password creator program in VB a while back you wanna take a look at it?
    Sure. Go ahead and post it. I'll take a look-see at it.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

Page 1 of 2 12 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •