maemo.org - Talk

maemo.org - Talk (https://talk.maemo.org/index.php)
-   Applications (https://talk.maemo.org/forumdisplay.php?f=41)
-   -   [ announce ] hackattack! (https://talk.maemo.org/showthread.php?t=74081)

torpedo48 2011-06-18 10:39

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by anapospastos (Post 1031336)
ifile is down. Can you upload somewhere else the tar file from post 2?

http://laboratorio.torpedo48.it/downloads/wifi.tgz

torpedo48 2011-06-18 10:54

Re: [ announce ] hackattack!
 
Just published a simple guide for the very beginners: following it anyone will be able to properly set wifite (with the wepon/wepoff method brought to us by vi_, many thanks to him) and to crack a WEP key in minutes:

http://laboratorio.torpedo48.it/noki...ully-automated

@vi_: I'll be honoured if you insert a link to this guide in your article, so that everyone can follow the guide and install your awesome work ;)

Unhuman 2011-06-18 11:13

Re: [ announce ] hackattack!
 
Seriously the last 10posts have nothing to do with this topic?..

EDIT:.
Lawl didn't notice post 2... But seriously the 2 scripts have nothing in common and makes the thread discussion ******ed.

torpedo48 2011-06-18 11:24

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by Unhuman (Post 1031361)
Seriously the last 10posts have nothing to do with this topic?..

Why do you say that? We are discussing about the scripts provided in the original posts, so I think they're pretty on-topic:confused:

vi_ 2011-06-18 11:44

Re: [ announce ] hackattack!
 
In response to some PMs I am getting.

1. If you are having difficulty installing this, persevere. It is how ALL of us learned to do this stuff in the first place. My first linux computer was a hp jornada 680, it didn't even have a gui when I started. It took me over a week (see over 20 hours) of hitting my head off a concrete penguin just to connect the thing to my university's wifi. It was back when WPA supplicant had EVEN LESS DOCUMENTATION. Point is, just persevere, you will be a better person after it!

2. Rainbow tables for WPA. MUTS from backtrack had a hand in generating these rainbow tables. These beasts are around 2GB in size each and only the top 200 ssids are covered. I estimate an n900 might be able to crunch through these 49 MILLION(!) password dictionaries in around an hour.

Be warned, some of these tables are broken, for example the belkin54g table (I think) has a capital letter at the start (DOH!) rendering it completely worthless (unless someone changed their SSID to it)

zozeta2 2011-06-18 12:38

Re: [ announce ] hackattack!
 
[QUOTE=stevomanu;1031301]
my metaspliots work good but it tells mee a error when i start it
the ruby1.8-openssl?????

Mentalist Traceur 2011-06-18 12:45

Re: [ announce ] hackattack!
 
Omg WPA rainbow tables! I've been meaning to get off my *** and find some, but now I don't have to work for it. Thank you!

vi_ 2011-06-18 12:55

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by Mentalist Traceur (Post 1031389)
Omg WPA rainbow tables! I've been meaning to get off my *** and find some, but now I don't have to work for it. Thank you!

well then, just for you mentalist here are the previous incarnation of said tables. These are 1 million word dictionary tables for the top 1000 SSIDS. These are a little more portable at on 40MB each.

Hey...WPA brute-forcing on the N900 may not be such a crazy idea after all!

I think this is a thompson speedtouch/bthomehub rainbow table too.

mr_pingu 2011-06-18 13:11

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by vi_ (Post 1031393)
well then, just for you mentalist here are the previous incarnation of said tables. These are 1 million word dictionary tables for the top 1000 SSIDS. These are a little more portable at on 40MB each.

Hey...WPA brute-forcing on the N900 may not be such a crazy idea after all!

I think this is a thompson speedtouch/bthomehub rainbow table too.

Speedtouch keys even WPA can be derived from SSID: stkeys on n900 and speedtouched for windows?

How can these tables be specific for a manufacturer? If we change the password then they fail also, or am I wrong?

vi_ 2011-06-18 13:27

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by mr_pingu (Post 1031402)
Speedtouch keys even WPA can be derived from SSID: stkeys on n900 and speedtouched for windows?

Stkeys USED to work before they changed the algorithm. Now the hex characters at the end of the speedtouch SSID cannot be used to derive the key. However, the key IS still produced from the devices serial number (or something like that). This reduces the potential keyspace significantly. i.e. The length of the key is known, The character set is known and the format of the serial number is known.

Code:

How can these tables be specific for a manufacturer? If we change the password then they fail also, or am I wrong?
I am not sure I understand what you mean. The rainbow table is for a network with that specific SSID. In 'short laymans not really true terms':

WPA key=SHA1SUM(SSID+PASSWORD)

Thus we need a specific table for any given SSID (unlike LANMAN windows table). It has nothing to do with manufacturer, it just so happens than belkin, netgear etc. use their own name as the default SSID and as such that SSID will become one of the most common. In addition to this humans are predictable in their choice of SSID. How many 'skynet's and 'myhome' wifi networks have you seen?

see

and

I love this one, it is like reading a geek thriller.

karam 2011-06-18 13:29

Re: [ announce ] hackattack!
 
Oh i actually just noticed this thread is here

just a bottom line

N900 can hack WEP easily
N900 can hack WPA hardly using rainbow tables
N900 can't hack WPA with normal handshake (it will take for ever)


BUT N900 can hack WPA easily with easy-debian after installing dhcp3
apache2 apache2-mod-php5 and aircrack-ng suit also iptables and iproute

then simply create a fake ap with dhcp3 server and apache2 and in addition to a phisher web page wich has the same bssid and esside of the target (but not he same channel)
then i DOS the orginal AP so the target will automaticly connects to my fake ap ( windows problem)


in my case i use a fake web page
telling the owner that a new firmware has been installed to his router (i know the type of his router with kismet) to create the perfect phisher

and a reconfigure of wep/wpa key is required
so when he enters the key
i get it directly to my n900

That is my way to hack WPA with N900

PS: just linked this thread in my thread
soon with these beautiful threads we would have a super N900

Mentalist Traceur 2011-06-18 14:08

Re: [ announce ] hackattack!
 
Lol at the social engineering approach. That's always fun.

In the meantime, I think if you have access to some 3G internet and have a server running at home you can SSH into, you should be more that able to launch more hardcore attacks against WPA networks that don't fall prey to your basic on-board rainbow tables.

One thing of possible concern: http://forum.aircrack-ng.org/index.php?topic=5965.0

Looks like the tables provided by Offensive Security have a bunch of invalid passwords. Well, that post is from 2009 so that may have changed by now, but figured I'd mention it and if anyone knows better, they can speak up.

stevomanu 2011-06-18 14:15

Re: [ announce ] hackattack!
 
[QUOTE=zozeta2;1031386]
Quote:

Originally Posted by stevomanu (Post 1031301)
my metaspliots work good but it tells mee a error when i start it
the ruby1.8-openssl?????


you care to share your metaspliots with us then ??

karam 2011-06-18 14:28

Re: [ announce ] hackattack!
 
there is an exploit (not public) with wpa/wpa2 system
i forgot what is it called wich allows to easily hack wpa just like wep
PS: IT IS NOT TKIPTUN-NG (another one)
but it is the reason that they will launch another security system
maybe 2013

AgogData 2011-06-18 15:06

Re: [ announce ] hackattack!
 
Here is my output :

Code:

BusyBox v1.10.2 (Debian 3:1.10.2.legal-1osso30+0m5) built-in shell (ash)
Enter 'help' for a list of built-in commands.

~ $ root


BusyBox v1.10.2 (Debian 3:1.10.2.legal-1osso30+0m5) built-in shell (ash)
Enter 'help' for a list of built-in commands.

Nokia-N900:~# wepon
[!] unable to import pexpect
[!] if your chipset is intel4965; the fake-auth workaround will fail
[!] unable to import tkinter -- GUI disabled

  .;'                    `;,   
 .;'  ,;'            `;,  `;,  WiFite r78
.;'  ,;'  ,;'    `;,  `;,  `;, 
::  ::  :  ( )  :  ::  ::  mass WEP/WPA cracker
':.  ':.  ':. /_\ ,:'  ,:'  ,:' 
 ':.  ':.    /___\    ,:'  ,:'  designed for backtrack4
  ':.      /_____\      ,:'   
          /      \           

[+] WARNING: recommended packages/apps were not found pyrit, cowpatty
[+] targeting networks with signal power greater than 12dB
[+] set WEP replay pps: 500/sec
[+] anonymous mac address enabled

[+] searching for devices in monitor mode...
[+] using interface "wlan0"

[+] waiting 30 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 29 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 28 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 27 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 26 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 25 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 24 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 23 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 22 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 21 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 20 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 19 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 18 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 17 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 16 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 15 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 14 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 13 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 12 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 11 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 10 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 9 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 8 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 7 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 6 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 5 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 4 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 3 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 2 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 1 seconds for targets to appear. press Ctrl+C to skip the wait                           

[0:00:31] 2 targets and 1 clients found

[+] added to attack list: "home3" (99dB)
[+] 1 access points targeted for attack

[+] estimated maximum wait time is 40 minutes
[+] changing mac address to 00:19:5D:4D:25:C3...  changed!

[+] attacking "home3"...
[0:09:58] changing mac to 18:86:ac:e1:5a:96...
[0:09:58] changed mac; continuing attack
[0:09:59] started arp replay attack on "home3"; Ctrl+C for options
[0:09:59] arp replay attack on "home3" captured 0 ivs (0/sec)                Nokia-N900:/root# 
[0:09:59] stopping attack on "home3"...

[+] please select a menu option below:
  [c]ontinue attacking; 3 methods left
  [e]xit the program completely
[+] enter option (c, or e): Traceback (most recent call last):
  File "/opt/wifi_mon/wifite.py", line 3542, in <module>
    main() # launch the main method
  File "/opt/wifi_mon/wifite.py", line 920, in main
    attack(x - 1) # subtract one because arrays start at 0
  File "/opt/wifi_mon/wifite.py", line 2009, in attack
    attack_wep_all(index)
  File "/opt/wifi_mon/wifite.py", line 2472, in attack_wep_all
    typed=raw_input()
EOFError

There is many networks in range including my ad-hoc network (home3), the script attacks it first and when i press ctrl & c to change it i get whats written above.
and i have to close xterm and open it again to be able to type 'wepoff'
N.B: Thats of course for scientifical and geological purposes only

torpedo48 2011-06-18 16:16

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by AgogData (Post 1031463)
Here is my output :

Code:

BusyBox v1.10.2 (Debian 3:1.10.2.legal-1osso30+0m5) built-in shell (ash)
Enter 'help' for a list of built-in commands.

~ $ root


BusyBox v1.10.2 (Debian 3:1.10.2.legal-1osso30+0m5) built-in shell (ash)
Enter 'help' for a list of built-in commands.

Nokia-N900:~# wepon
[!] unable to import pexpect
[!] if your chipset is intel4965; the fake-auth workaround will fail
[!] unable to import tkinter -- GUI disabled

  .;'                    `;,   
 .;'  ,;'            `;,  `;,  WiFite r78
.;'  ,;'  ,;'    `;,  `;,  `;, 
::  ::  :  ( )  :  ::  ::  mass WEP/WPA cracker
':.  ':.  ':. /_\ ,:'  ,:'  ,:' 
 ':.  ':.    /___\    ,:'  ,:'  designed for backtrack4
  ':.      /_____\      ,:'   
          /      \           

[+] WARNING: recommended packages/apps were not found pyrit, cowpatty
[+] targeting networks with signal power greater than 12dB
[+] set WEP replay pps: 500/sec
[+] anonymous mac address enabled

[+] searching for devices in monitor mode...
[+] using interface "wlan0"

[+] waiting 30 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 29 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 28 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 27 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 26 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 25 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 24 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 23 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 22 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 21 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 20 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 19 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 18 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 17 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 16 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 15 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 14 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 13 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 12 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 11 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 10 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 9 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 8 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 7 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 6 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 5 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 4 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 3 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 2 seconds for targets to appear. press Ctrl+C to skip the wait    [+] waiting 1 seconds for targets to appear. press Ctrl+C to skip the wait                           

[0:00:31] 2 targets and 1 clients found

[+] added to attack list: "home3" (99dB)
[+] 1 access points targeted for attack

[+] estimated maximum wait time is 40 minutes
[+] changing mac address to 00:19:5D:4D:25:C3...  changed!

[+] attacking "home3"...
[0:09:58] changing mac to 18:86:ac:e1:5a:96...
[0:09:58] changed mac; continuing attack
[0:09:59] started arp replay attack on "home3"; Ctrl+C for options
[0:09:59] arp replay attack on "home3" captured 0 ivs (0/sec)                Nokia-N900:/root# 
[0:09:59] stopping attack on "home3"...

[+] please select a menu option below:
  [c]ontinue attacking; 3 methods left
  [e]xit the program completely
[+] enter option (c, or e): Traceback (most recent call last):
  File "/opt/wifi_mon/wifite.py", line 3542, in <module>
    main() # launch the main method
  File "/opt/wifi_mon/wifite.py", line 920, in main
    attack(x - 1) # subtract one because arrays start at 0
  File "/opt/wifi_mon/wifite.py", line 2009, in attack
    attack_wep_all(index)
  File "/opt/wifi_mon/wifite.py", line 2472, in attack_wep_all
    typed=raw_input()
EOFError

There is many networks in range including my ad-hoc network (home3), the script attacks it first and when i press ctrl & c to change it i get whats written above.
and i have to close xterm and open it again to be able to type 'wepoff'
N.B: Thats of course for scientifical and geological purposes only

It seems that the only errors you get are the pexpect one and the python-tk one, althought they are not needed for the attack... Try an apt-get install pexpect, but I don't think it will do much. Is your python up-to-date?

Sorry but I can't really think about any cause for your problem, if you have carefully followed the guide and you're using the modified kernel-power or kernel-power v47 wifite should work properly, you are the first encountering problems. :confused:

AgogData 2011-06-18 16:40

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by torpedo48 (Post 1031485)
It seems that the only errors you get are the pexpect one and the python-tk one, althought they are not needed for the attack... Try an apt-get install pexpect, but I don't think it will do much. Is your python up-to-date?

Sorry but I can't really think about any cause for your problem, if you have carefully followed the guide and you're using the modified kernel-power or kernel-power v47 wifite should work properly, you are the first encountering problems. :confused:

Yes, my pythin version is the latest. And i think what happened is because home3 (my network) is an ad-hoc [shared LAN connection through wireless laptop]
Is there a way that i can choose which network i can crack ? so it doesn't auto. choose home3 ?

vi_ 2011-06-18 16:50

Re: [ announce ] hackattack!
 
Yes. edit the 'wepon' script. comment out the line that puts the device into monitor mode. This will force wifite to put your card into monitor mode (didnt work right for me, apparently worked for mr_pingu).

This will cause wifite to enter a different scan mode and allow network selection.

q6600 2011-06-18 17:01

Re: [ announce ] hackattack!
 
1 Attachment(s)
hi
after 10 h of playing with my n900 ( flash and install all ...) i manage to instal the script but ...

AgogData 2011-06-18 18:34

Re: [ announce ] hackattack!
 
I'm now stuck with arp replay attack on XXXX captured # ivs
then chop-chop attack
what is wrong here ?

torpedo48 2011-06-18 18:58

Re: [ announce ] hackattack!
 
I really don't know what's going on here, there's obviously something wrong with your wifites but... What? I've tried searching for wifite's dependences but they all seem to be satisfied here.

Have you used particular tweaks and/or procedures that may have f*****d up your wifi's or network's settings?

q6600 2011-06-18 18:59

Re: [ announce ] hackattack!
 
1 Attachment(s)
new pic better quality
i flash my n900 and install all from 0 no tweaks
also injection rate is slow. any tips ...

AgogData 2011-06-18 19:03

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by torpedo48 (Post 1031561)
I really don't know what's going on here, there's obviously something wrong with your wifites but... What? I've tried searching for wifite's dependences but they all seem to be satisfied here.

Have you used particular tweaks and/or procedures that may have f*****d up your wifi's or network's settings?

Nope, nothing at all
did this work with some1 else here ?
should i edit wepon like vi_ and mr_pingu said to be like that :

Code:

#!/bin/sh
#wifite starter
/opt/wifi_mon/load.sh
sleep 2
airmon-ng start wlan0 down
sleep 1
iwconfig wlan0 mode monitor
sleep 1
airmon-ng start wlan0 up
sleep 1
python /opt/wifi_mon/wifite.py --power 12 --pps 500 --anon

i.e. : airmon-ng start wlan0 insted of ifconfig wlan0

torpedo48 2011-06-18 19:21

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by AgogData (Post 1031564)
Nope, nothing at all
did this work with some1 else here ?
should i edit wepon like vi_ and mr_pingu said to be like that :

Code:

#!/bin/sh
#wifite starter
/opt/wifi_mon/load.sh
sleep 2
airmon-ng start wlan0 down
sleep 1
iwconfig wlan0 mode monitor
sleep 1
airmon-ng start wlan0 up
sleep 1
python /opt/wifi_mon/wifite.py --power 12 --pps 500 --anon

i.e. : airmon-ng start wlan0 insted of ifconfig wlan0

No, content of wepon should be:

Code:

#!/bin/sh
#wifite starter
/opt/wifi_mon/load.sh
sleep 2
ifconfig wlan0 down
sleep 1
iwconfig wlan0 mode monitor
sleep 1
ifconfig wlan0 up
sleep 1
python /opt/wifi_mon/wifite.py --power 12 --pps 500 --anon

And yes, it works for me and many others.

q6600 2011-06-18 19:29

Re: [ announce ] hackattack!
 
1 Attachment(s)
Success,
i didn't waste a day trying to this working :o.
http://laboratorio.torpedo48.it/noki...ully-automated

but make sure you put the codes

#!/bin/sh
#wifite starter
/opt/wifi_mon/load.sh
sleep 2
ifconfig wlan0 down
sleep 1
iwconfig wlan0 mode monitor
sleep 1
ifconfig wlan0 up
sleep 1
python /opt/wifi_mon/wifite.py --power 12 --pps 500 --anon



#!/bin/sh
/opt/wifi_mon/unload.sh


http://talk.maemo.org/showthread.php?t=74081

mr_pingu 2011-06-18 19:29

Re: [ announce ] hackattack!
 
If something is not right you should load the drivers manually by cd into the drivers folder and sh load.sh ;)

Then do python /opt/wifi_mon/wifite.py
Or better download wifite.py from wifite homepage and do python /home/user/MyDocs/wifite.py

This way you filter out any error in vi_'s script, but I am almost sure there is nothing wrong with vi_'s script!!!

torpedo48 2011-06-18 19:33

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by q6600 (Post 1031577)
Success,
i didn't waste a day trying to this working :o.
http://laboratorio.torpedo48.it/noki...ully-automated

but make sure you put the codes

#!/bin/sh
#wifite starter
/opt/wifi_mon/load.sh
sleep 2
ifconfig wlan0 down
sleep 1
iwconfig wlan0 mode monitor
sleep 1
ifconfig wlan0 up
sleep 1
python /opt/wifi_mon/wifite.py --power 12 --pps 500 --anon



#!/bin/sh
/opt/wifi_mon/unload.sh


http://talk.maemo.org/showthread.php?t=74081

Sorry, I can't understand where the error was. Is that something wrong in my guide? What have you done in order to succeed?

q6600 2011-06-18 19:37

Re: [ announce ] hackattack!
 
i instal step buy step from your website but is not working. i didnt seen the codes on your website

#!/bin/sh
#wifite starter
/opt/wifi_mon/load.sh
sleep 2
ifconfig wlan0 down
sleep 1
iwconfig wlan0 mode monitor
sleep 1
ifconfig wlan0 up
sleep 1
python /opt/wifi_mon/wifite.py --power 12 --pps 500 --anon



#!/bin/sh
/opt/wifi_mon/unload.sh


the program worked after i put the codes manual. i dont know why.

torpedo48 2011-06-18 19:39

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by q6600 (Post 1031588)
i instal step buy step from your website but is not working. i didnt seen the codes on your website

#!/bin/sh
#wifite starter
/opt/wifi_mon/load.sh
sleep 2
ifconfig wlan0 down
sleep 1
iwconfig wlan0 mode monitor
sleep 1
ifconfig wlan0 up
sleep 1
python /opt/wifi_mon/wifite.py --power 12 --pps 500 --anon

#!/bin/sh
/opt/wifi_mon/unload.sh

That's because they are included in Step 3's package, try downloading it, extracting wepon and wepoff and read them, ta-daaaaaa codes inside ;)

q6600 2011-06-18 19:46

Re: [ announce ] hackattack!
 
dooohhh
man sorry i am a noob

torpedo48 2011-06-18 19:49

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by q6600 (Post 1031599)
dooohhh
man sorry i am a noob

No problem, we all started somewhere ;)

Could you please tell me where your error was, so that I can make the guide even easier? You didn't properly follow step 3, did you? :)

q6600 2011-06-18 19:54

Re: [ announce ] hackattack!
 
please look on post 62
theni i put the codes in xterm ( as root) and the program worked

mr_pingu 2011-06-18 20:07

Re: [ announce ] hackattack!
 
1 Attachment(s)
Only load the bleeding edge drivers and let wifite do the rest ;)
Prove attached :P :D

I runned it without the --power --pps and --anon, just normal


You may like this piece of code which has the anonymous mode, power above 12 and 500 packets per second still enabled as vi_ proposed ;)

Code:

#!/bin/sh
#wifite starter
/opt/wifi_mon/load.sh
python /opt/wifi_mon/wifite.py --power 12 --pps 500 --anon


AgogData 2011-06-18 20:32

Re: [ announce ] hackattack!
 
In the begining of the attack it says that packages pyritt and cowpatty are missing, should i install them ?

mr_pingu 2011-06-18 20:42

Re: [ announce ] hackattack!
 
nope, it will run fine without them, macchanger should you install tho ;)

szopin 2011-06-19 07:41

Re: [ announce ] hackattack!
 
You can run the non-patched wifite.py, just give your /tmp more space as it dumps .ivs there (standard 1MB allows for only ~70000, so 32MB should be enough for anybody):

sudo mount -o remount,size=32M /tmp

and you're good to go

pusak gaoq 2011-06-19 08:22

Re: [ announce ] hackattack!
 
i'm new on this so called wepon...i have install everything & able to run the program with just one question???
after we start attacking any connection does the password will be reveal at the end or do we have you decrypt it like faircrack????
i'm asking cause i couldnt run the program to the end due to dry out battery...

eefo 2011-06-19 08:24

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by pusak gaoq (Post 1031866)
i'm new on this so called wepon...i have install everything & able to run the program with just one question???
after we start attacking any connection does the password will be reveal at the end or do we have you decrypt it like faircrack????
i'm asking cause i couldnt run the program to the end due to dry out battery...

yes it shows the exact password as saved by the user ;)


http://laboratorio.torpedo48.it/noki...ully-automated

look at the end part of the video it will answer you :P

mr_pingu 2011-06-19 10:32

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by szopin (Post 1031851)
You can run the non-patched wifite.py, just give your /tmp more space as it dumps .ivs there (standard 1MB allows for only ~70000, so 32MB should be enough for anybody):

sudo mount -o remount,size=32M /tmp

and you're good to go

Thanks

Since I don't like being /tmp taking up rootspace, can't we mount it on opt? Dang here you see I am only a 3 months old linux user and lacks experience :(
Generally I want to have /tmp/ taking up /opt/ space instead of root space since I don't like the idea of root becoming full after using this. Maybe symlinking?

vi_ 2011-06-19 11:34

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by mr_pingu (Post 1031949)
Thanks

Since I don't like being /tmp taking up rootspace, can't we mount it on opt? Dang here you see I am only a 3 months old linux user and lacks experience :(
Generally I want to have /tmp/ taking up /opt/ space instead of root space since I don't like the idea of root becoming full after using this. Maybe symlinking?

Fret not my son.

All we have to do is change where wifite dumps it's temporary files.

run in xterm:

Code:

sudo sed -i "s/(prefix='wifite')/(prefix='wifite',dir='\/opt\/tmp')/g" /opt/wifi_mon/wifite.py; sudo if [ ! -d "/opt/tmp" ]; then mkdir /opt/tmp; fi
This edits wifite to use /opt/tmp as the tmp folder, then checks to see if /opt/tmp exists and creates it if not.

Viola, no more /tmp/ restrictions!


All times are GMT. The time now is 02:17.

vBulletin® Version 3.8.8