maemo.org - Talk

maemo.org - Talk (https://talk.maemo.org/index.php)
-   Applications (https://talk.maemo.org/forumdisplay.php?f=41)
-   -   [ announce ] hackattack! (https://talk.maemo.org/showthread.php?t=74081)

mr_pingu 2011-06-19 11:53

Re: [ announce ] hackattack!
 
Thanks works for wifite.py :D But when you run ettercap(not through YAMAS) it has also to the problem of /tmp being to small and stops after some time with capturing

So that's why I asked too ;)

vi_ 2011-06-19 12:09

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by mr_pingu (Post 1031985)
Thanks works for wifite.py :D But when you run ettercap(not through YAMAS) it has also to the problem of /tmp being to small and stops after some time with capturing

So that's why I asked too ;)

Well you could symlink /tmp/ to /opt/tmp with

Code:

ln -s /tmp/ /opt/
or something. I don't know just experiment. Might make your device non bootable, might not.

Be brave and find out for the rest of us.

szopin 2011-06-19 12:19

Re: [ announce ] hackattack!
 
Dudes, resizing your /tmp is only until you reboot, so /opt problem solved. Wanna hack, get 31MB free, you still would have to.

vi_,

'%TMPDIR' is believe what is in wifite.py, so your command might not work, no idea.

You seem to be mighty linux guy, can/could you pinpoint the part in wifitie.py that dumps ivs there and deletes on exit? It always uses wep01.ivs filename, and with -p0841 attack it would be really great if it dumped it and not delete after unsuccessful crack. Sometimes running twice/thrice is required.

vi_ 2011-06-19 12:51

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by szopin (Post 1032000)
Dudes, resizing your /tmp is only until you reboot, so /opt problem solved. Wanna hack, get 31MB free, you still would have to.

vi_,

'%TMPDIR' is believe what is in wifite.py, so your command might not work, no idea.

You seem to be mighty linux guy, can/could you pinpoint the part in wifitie.py that dumps ivs there and deletes on exit? It always uses wep01.ivs filename, and with -p0841 attack it would be really great if it dumped it and not delete after unsuccessful crack. Sometimes running twice/thrice is required.

wifite patch/script to remove tmp problem.

tmp is defined at the start of the program using python mkdtemp function/call/thingy.

If you felt that non-removal of -p0841 files would be of benefit I highly suggest you get in contact with the creator of wifite.py. I am not keen to 'butcher' his work and break compatibility with future upgrades.

szopin 2011-06-19 12:55

Re: [ announce ] hackattack!
 
Tried to, no reply so far (1 month) which is why I'm reaching to other people. If it's addition (or removal) of one line, doesn't seem that butchery to me :P

<edit> Still after each update we have to change AUTOCRACK=9000 to a higher value as that kills N900 processor and is highly unlikely in most situations

mr_pingu 2011-06-19 13:27

Re: [ announce ] hackattack!
 
After some test I see that rootfs space is unaffected by thhe space of /tmp/
I made tmp 16'MB and coppied a musicfile of 8MB to it, ran df -h and I saw that rootfs space still was the same ;)

So god knows where the space from /tmp is pulled from :O as opt didn't change also... gonna investigate if we can set 32MB as default of /tmp on boot...


edit: Never changed autocrack value :P Just put that ***** on 1GHZ and you have the key in les than 4 minutes ;)

szopin 2011-06-19 13:56

Re: [ announce ] hackattack!
 
As N900 seems to have a limit of around 200 packets/second it takes 6-7mins to get 50000 ivs which normally is enough. I noticed that -p0481 attacks sometimes generates dubiuos data, which is why I would love for Wifite script to dump it and append as 2-3 attacks is enough (maybe I got lucky and there was casual user in the meantime, no idea) in most cases.

mr_pingu 2011-06-19 14:14

Re: [ announce ] hackattack!
 
Yes I had a pm with agogdata yesterday and I already told him that the pps limit is better to be set to 200 pps as it will work better for longer ranges and its a reasonable value for a mobile device :D

Yesterday I had cracked my own Network and that was to be exactly in 3 minutes and 36 seconds ;) That's the ideal situation tho :p

szopin 2011-06-19 15:29

Re: [ announce ] hackattack!
 
Yeah, with signal around -50 my own went swiftly in around 4 mins. In most _working_ cases it's 85-90 and gettin 100+ is excellent. Having to manually copy the ivs from auto-tool is a biatch though

AgogData 2011-06-19 16:04

Re: [ announce ] hackattack!
 
I'm just curious, can WPA networks be cracked ? cause it asks for a dictionary.
and upgrading wifite (thanks to mr_pingu) seems to work better but still no luck with cracking

szopin 2011-06-19 17:27

Re: [ announce ] hackattack!
 
WPA networks are out of reach mostly. If a user is so informed to not use WEP he is also informed to not use his child's name as password when switching to WPA. Though sometimes works

JamesBond@ge 2011-06-19 18:00

Re: [ announce ] hackattack!
 
Loving the idea behind this.

I am a novice at this kind of thing. I know there is a good chance of bricking the phone when doing these sorts of things which is why I'm getting a 2nd phone in the next few weeks specifically for this, and all the other stuff that I want to do that might reboot loop me (second hand of course, do I look rich?)

Tell me this though, can this be done on a stock 600mhz N900 on the standard Kernel?

Thanks in advance, you bunch of sexeh geniuses, you! x

vi_ 2011-06-19 18:24

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by JamesBond@ge (Post 1032196)
Loving the idea behind this.

I am a novice at this kind of thing. I know there is a good chance of bricking the phone when doing these sorts of things which is why I'm getting a 2nd phone in the next few weeks specifically for this, and all the other stuff that I want to do that might reboot loop me (second hand of course, do I look rich?)

Tell me this though, can this be done on a stock 600mhz N900 on the standard Kernel?

Thanks in advance, you bunch of sexeh geniuses, you! x

Depends what it is you specifically want to do...

What are you wanting to do?

AgogData 2011-06-19 18:45

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by JamesBond@ge (Post 1032196)
Tell me this though, can this be done on a stock 600mhz N900 on the standard Kernel?

no you must have kernel power v47, its all in the 2nd post (what i'm using at least)
Quote:

Originally Posted by JamesBond@ge (Post 1032196)
you bunch of sexeh geniuses, you! x

0_0 still with your weird posts i see

comaX 2011-06-19 19:18

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by Unhuman (Post 1031004)
Google
http://pcsci3nce.info/?p=9
http://pcsci3nce.info/?p=11

As for the script - I haven't had the time to test it yet, however can it NOT be in this green font :X It is ugly :(

>< +1

I'll have a look at what you have done in the next few days and report back ;)

Too bad you split though, it might be a bit confusing for users, and counter productive. Check the original thread for a solution I thought about !

szopin 2011-06-19 19:59

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by JamesBond@ge (Post 1032196)
Loving the idea behind this.

I am a novice at this kind of thing. I know there is a good chance of bricking the phone when doing these sorts of things which is why I'm getting a 2nd phone in the next few weeks specifically for this, and all the other stuff that I want to do that might reboot loop me (second hand of course, do I look rich?)

Tell me this though, can this be done on a stock 600mhz N900 on the standard Kernel?

Thanks in advance, you bunch of sexeh geniuses, you! x

Installing bleeding edge drivers will not brick your phone. Actually, most things you can type into it have no chance of doing that. If you are participating in gamma releases (which I doubt based on your post) you are free to f..k your phone as much as you can and it should still work. Mine does

stevomanu 2011-06-19 21:01

Re: [ announce ] hackattack!
 
just tryed redownloading the yamas-n900 script using wget link an i get this error any ideas

Code:

/home/user # wget http://pastebin.com/raw.php?i=NtFnfJBt -O yamas_n900.sh && chmod +x ./yamas_n900
.shwget http://pastebin.com/raw.php?i=NtFnfJBt -O yamas_n900.sh && chmod +x ./yamas_n900.sh
--22:02:33--  http://pastebin.com/raw.php?i=NtFnfJBt
          => `yamas_n900.sh'
Resolving pastebin.com... 173.236.52.197
Connecting to pastebin.com|173.236.52.197|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: unspecified [text/plain]

    [  <=>                                                ] 16,524        15.62K/s           

22:02:34 (15.61 KB/s) - `yamas_n900.sh' saved [16524]

chmod: invalid option -- O
BusyBox v1.18.5 (Debian 1.18.5power1) multi-call binary.

Usage: chmod [-R] MODE[,MODE]... FILE...

Each MODE is one or more of the letters ugoa, one of the
symbols +-= and one or more of the letters rwxst

Options:
        -R        Recurse

/home/user #

many thanks

mr_pingu 2011-06-19 21:04

Re: [ announce ] hackattack!
 
Cd to script folder and do manually
Quote:

chmod +x yamas_n900.sh

stevomanu 2011-06-19 21:48

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by mr_pingu (Post 1032285)
Cd to script folder and do manually

i did that an the end thanks thou an also it still says ettercap is installed in
Code:

usr/sbin/ettercap
shouldnt it be
Code:

usr/bin/ettercap

Dragoss91 2011-06-21 10:05

Re: [ announce ] hackattack!
 
This is what I got :-s

Quote:

Nokia-N900:~# wepon
[!] unable to import pexpect
[!] if your chipset is intel4965; the fake-auth workaround will fail
[!] unable to import tkinter -- GUI disabled

.;' `;,
.;' ,;' `;, `;, WiFite r78
.;' ,;' ,;' `;, `;, `;,
:: :: : ( ) : :: :: mass WEP/WPA cracker
':. ':. ':. /_\ ,:' ,:' ,:'
':. ':. /___\ ,:' ,:' designed for backtrack4
':. /_____\ ,:'
/ \

[+] WARNING: recommended packages/apps were not found pyrit, cowpatty
[+] targeting networks with signal power greater than 12dB
[+] set WEP replay pps: 500/sec
[+] anonymous mac address enabled

[+] searching for devices in monitor mode...
[+] using interface "wlan0"

[+] waiting 30 seconds for targets to appear. press Ctrl+C t[+] waiting 29 seconds for targets to appear. press Ctrl+C t[+] waiting 28 seconds for targets to appear. press Ctrl+C t[+] waiting 27 seconds for targets to appear. press Ctrl+C t[+] waiting 26 seconds for targets to appear. press Ctrl+C t[+] waiting 25 seconds for targets to appear. press Ctrl+C t[+] waiting 24 seconds for targets to appear. press Ctrl+C t[+] waiting 23 seconds for targets to appear. press Ctrl+C t[+] waiting 22 seconds for targets to appear. press Ctrl+C t[+] waiting 21 seconds for targets to appear. press Ctrl+C t[+] waiting 20 seconds for targets to appear. press Ctrl+C t[+] waiting 19 seconds for targets to appear. press Ctrl+C t[+] waiting 18 seconds for targets to appear. press Ctrl+C t[+] waiting 17 seconds for targets to appear. press Ctrl+C t[+] waiting 16 seconds for targets to appear. press Ctrl+C t[+] waiting 15 seconds for targets to appear. press Ctrl+C t[+] waiting 14 seconds for targets to appear. press Ctrl+C t[+] waiting 13 seconds for targets to appear. press Ctrl+C t[+] waiting 12 seconds for targets to appear. press Ctrl+C t[+] waiting 11 seconds for targets to appear. press Ctrl+C t[+] waiting 10 seconds for targets to appear. press Ctrl+C t[+] waiting 9 seconds for targets to appear. press Ctrl+C to[+] waiting 8 seconds for targets to appear. press Ctrl+C to[+] waiting 7 seconds for targets to appear. press Ctrl+C to[+] waiting 6 seconds for targets to appear. press Ctrl+C to[+] waiting 5 seconds for targets to appear. press Ctrl+C to[+] waiting 4 seconds for targets to appear. press Ctrl+C to[+] waiting 3 seconds for targets to appear. press Ctrl+C to[+] waiting 2 seconds for targets to appear. press Ctrl+C to[+] waiting 1 seconds for targets to appear. press Ctrl+C to skip the wait

[0:00:31] 0 targets and 0 clients found

[+] there are no targets with a power level greater than 12dB
[+] try selecting a lower power threshold


Nokia-N900:~# wepoff
ifconfig: invalid hw-addr A0
Nokia-N900:~#

AgogData 2011-06-21 10:10

Re: [ announce ] hackattack!
 
Do you have the bleeding edge driver ? and i prefer the manual usage of wifite as mr_pingu said :
1)load the bleeding edge driver
2) /opt/wifite-directory/wifite.py
thats how you can choose your target and at earlier posts you can know how to set some settings (fake authentication - power)

Dragoss91 2011-06-21 10:32

Re: [ announce ] hackattack!
 
By the way , this hack can attack only WEP protected networks ? or WPA/WPA2 too ?

I used # python /opt/wifi_mon/wifite.py , the script ran and started stearching for wifi networks but it didn't find anything , 0 wireless 0 results , after I pressed CTRL + C , it said me make sure airodump_ng runs correctly .

AgogData 2011-06-21 10:35

Re: [ announce ] hackattack!
 
only WEP, it asks for a dictionary for WPA

mr_pingu 2011-06-21 15:14

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by AgogData (Post 1034469)
only WEP, it asks for a dictionary for WPA

You can type none if it ask for a dictionary ;) Won't help that much though ;)

Estel 2011-06-21 19:09

Re: [ announce ] hackattack!
 
When i try to decompress wifite optimised for N900 from post 2 (wifi.tgz), I got error "it doesn't look like tar file". Tried bot with tar -xzvf and Xarchiver. Downloaded 3 times, size seems to be correct. Any ideas?

torpedo48 2011-06-22 11:37

Re: [ announce ] hackattack!
 
If someone still has doubts about what the script in the OP is and what it does, I've made a video showing YAMAS in action:

http://www.youtube.com/watch?v=9bSq7tXSGAo

PS: vi_ is right, this script is like putting an AK-47 in a child's hand :)

jak 2011-06-22 12:00

Re: [ announce ] hackattack!
 
So, it's not related to hacking at all, but cracking. Please stop confusing people. The name of the thread makes it sound like a coding competition (as in hacking = coding), not like a tool for cracking things. Stop confusing us.

torpedo48 2011-06-22 12:03

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by jak (Post 1035840)
So, it's not related to hacking at all, but cracking. Please stop confusing people. The name of the thread makes it sound like a coding competition (as in hacking = coding), not like a tool for cracking things. Stop confusing us.

http://en.wikipedia.org/wiki/Hacker_(computer_security)

"A hacker is a person who breaks into computers and computer networks for profit, in protest, or because they are motivated by the challenge."

So this thread is pretty much about hacking I think.

If you read the article, you'll find that some people started a controversy about the hacker definition, so the word itself is confusing you, not us ;)

Joseph9560 2011-06-22 12:20

Re: [ announce ] hackattack!
 
I successfully broke my wifi network as well. 5 digit password within few minutes (about 5 I guess). In my case fourth attack brings fruit, first three types of attack fails. Plus when I reattacked the same network for second time it took about a minute or so excluding that count down time while searching for network.

Estel 2011-06-23 20:59

Re: [ announce ] hackattack!
 
If no one else got problem with decompressing wifite, can i ask for uploading it as pure tarball, without compression? Sorry, i'm out of ideas why archive appear corrupted to me, no matter how many times i redownload it.

vi_ 2011-06-23 21:14

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by Estel (Post 1037621)
If no one else got problem with decompressing wifite, can i ask for uploading it as pure tarball, without compression? Sorry, i'm out of ideas why archive appear corrupted to me, no matter how many times i redownload it.

Just this once, just for you estel.

here.

pursueky 2011-06-23 21:55

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by vi_ (Post 1037626)
Just this once, just for you estel


here.

kia-N900:~# wget http://pastebin.com/raw.php?i=z4uBgt64 -O ./yamas_n900.sh && chmod +x ./yamas_n900.sh
--22:49:12-- http://pastebin.com/raw.php?i=z4uBgt64
=> `./yamas_n900.sh'
Resolving pastebin.com... 173.236.52.197
Connecting to pastebin.com|173.236.52.197|:80... connected.
HTTP request sent, awaiting response... 302 Moved Temporarily
Location: /z4uBgt64 [following]
--22:49:15-- http://pastebin.com/z4uBgt64
=> `./yamas_n900.sh'
Connecting to pastebin.com|173.236.52.197|:80... connected.
HTTP request sent, awaiting response... 404 Not Found
22:49:16 ERROR 404: Not Found.

maemouser1 2011-06-25 12:05

Re: [ announce ] hackattack!
 
Hi was the script moved or something? Unknown paste ID.

Can you re-up please? Thanks

stevomanu 2011-06-25 12:21

Re: [ announce ] hackattack!
 
this script works amazing check it out

http://talk.maemo.org/showthread.php?t=73988

vi_ 2011-06-25 13:08

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by maemouser1 (Post 1038783)
Hi was the script moved or something? Unknown paste ID.

Can you re-up please? Thanks

see first post.

http://pastebin.com/u5nLZzra

vi_ 2011-06-25 13:08

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by stevomanu (Post 1038788)
this script works amazing check it out

http://talk.maemo.org/showthread.php?t=73988

orly? last time is checked it is STILL broken.

stevomanu 2011-06-25 13:12

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by vi_ (Post 1038815)
orly? last time is checked it is STILL broken.

sorry to say dude but that script does work i have tryed it this morning an all was fine ....

one question but what is different to that an yours you just posted ??

pursueky 2011-06-25 14:03

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by vi_ (Post 1030933)
update: new version, everything fixed now:o

You have probably seen the YAMAS MITM ARP spoof script that was recently announced. While an interesting idea, it was not written with the N900 in mind. Thus, it had numerous points that needed addressed before it could be considered ready for N900.


Greetz!

Thanks to comax for writing the thing.

Unhuman for hosting, alerting us to it.

Torpedo48 for testing, development.

Here I present a more N900 friendly version. This is better than the original because:

it has far fewer dependencies
is more compatible with a stock N900
it shutsdown ethercap nicely without barfing on the routers ARP table.

http://i54.tinypic.com/feqxpi.png

REQUIREMENTS:

iptables
nmap
iproute
python-twisted-web
python-openssl
python-scapy
libpcap0.8
libpcre3
sslstrip*see below
ettercap*see below

*Installation guide for ettercap, sslstrip and many other tools can be found at: http://pcsci3nce.info/?p=9

Refer to unhumans original post and blog for more details.

Script here:

link


Installer!

navigate to the directory you want to put the script in then run:

Code:

wget http://pastebin.com/raw.php?i=u5nLZzra -O ./yamas_n900.sh && chmod +x ./yamas_n900.sh

but it doesn't run in:
sh yasmas_n900.sh
or
bash yasmas_n900.sh

the same error loads as:
/home/user/MyDocs # bash yamas_n900.sh
: command not found 4:
'amas_n900.sh: line 26: syntax error near unexpected token `in
'amas_n900.sh: line 26: ` case $1 in
/home/user/MyDocs # sh yamas_n900.sh
: not foundsh: line 4:
yamas_n900.sh: line 26: syntax error: unexpected word (expecting "in")
/home/user/MyDocs #

vi_ 2011-06-25 14:35

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by pursueky (Post 1038852)
but it doesn't run in:
sh yasmas_n900.sh
or
bash yasmas_n900.sh

the same error loads as:
/home/user/MyDocs # bash yamas_n900.sh
: command not found 4:
'amas_n900.sh: line 26: syntax error near unexpected token `in
'amas_n900.sh: line 26: ` case $1 in
/home/user/MyDocs # sh yamas_n900.sh
: not foundsh: line 4:
yamas_n900.sh: line 26: syntax error: unexpected word (expecting "in")
/home/user/MyDocs #

Try again.

comaX 2011-06-25 15:09

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by vi_ (Post 1038815)
orly? last time is checked it is STILL broken.

I swear I could have said the same about yours. Please stop using the name yamas, as well as my parsing method (that you really fcuked up by the way. I mean, guys, if you want something that does't work, sure go for this.).
The rest of the code is free for anyone to use, modify and stuff.

I'll leave you some time to do so, after what I'll have to ask some higher authority to comply.

For those who want a version that DO work (even though it still needs two dependencies more), head to http://talk.maemo.org/showthread.php...81#post1038881
It's currently being "converted" to work with ash. ETA : 3-4 days (due to my moving out, I don't have much time !). As for osso-xterm, I'll see that later on, I really don't feel it's a priority.


All times are GMT. The time now is 02:14.

vBulletin® Version 3.8.8