maemo.org - Talk

maemo.org - Talk (https://talk.maemo.org/index.php)
-   Applications (https://talk.maemo.org/forumdisplay.php?f=41)
-   -   [ announce ] hackattack! (https://talk.maemo.org/showthread.php?t=74081)

torpedo48 2011-06-18 10:39

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by anapospastos (Post 1031336)
ifile is down. Can you upload somewhere else the tar file from post 2?

http://laboratorio.torpedo48.it/downloads/wifi.tgz

torpedo48 2011-06-18 10:54

Re: [ announce ] hackattack!
 
Just published a simple guide for the very beginners: following it anyone will be able to properly set wifite (with the wepon/wepoff method brought to us by vi_, many thanks to him) and to crack a WEP key in minutes:

http://laboratorio.torpedo48.it/noki...ully-automated

@vi_: I'll be honoured if you insert a link to this guide in your article, so that everyone can follow the guide and install your awesome work ;)

Unhuman 2011-06-18 11:13

Re: [ announce ] hackattack!
 
Seriously the last 10posts have nothing to do with this topic?..

EDIT:.
Lawl didn't notice post 2... But seriously the 2 scripts have nothing in common and makes the thread discussion ******ed.

torpedo48 2011-06-18 11:24

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by Unhuman (Post 1031361)
Seriously the last 10posts have nothing to do with this topic?..

Why do you say that? We are discussing about the scripts provided in the original posts, so I think they're pretty on-topic:confused:

vi_ 2011-06-18 11:44

Re: [ announce ] hackattack!
 
In response to some PMs I am getting.

1. If you are having difficulty installing this, persevere. It is how ALL of us learned to do this stuff in the first place. My first linux computer was a hp jornada 680, it didn't even have a gui when I started. It took me over a week (see over 20 hours) of hitting my head off a concrete penguin just to connect the thing to my university's wifi. It was back when WPA supplicant had EVEN LESS DOCUMENTATION. Point is, just persevere, you will be a better person after it!

2. Rainbow tables for WPA. MUTS from backtrack had a hand in generating these rainbow tables. These beasts are around 2GB in size each and only the top 200 ssids are covered. I estimate an n900 might be able to crunch through these 49 MILLION(!) password dictionaries in around an hour.

Be warned, some of these tables are broken, for example the belkin54g table (I think) has a capital letter at the start (DOH!) rendering it completely worthless (unless someone changed their SSID to it)

zozeta2 2011-06-18 12:38

Re: [ announce ] hackattack!
 
[QUOTE=stevomanu;1031301]
my metaspliots work good but it tells mee a error when i start it
the ruby1.8-openssl?????

Mentalist Traceur 2011-06-18 12:45

Re: [ announce ] hackattack!
 
Omg WPA rainbow tables! I've been meaning to get off my *** and find some, but now I don't have to work for it. Thank you!

vi_ 2011-06-18 12:55

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by Mentalist Traceur (Post 1031389)
Omg WPA rainbow tables! I've been meaning to get off my *** and find some, but now I don't have to work for it. Thank you!

well then, just for you mentalist here are the previous incarnation of said tables. These are 1 million word dictionary tables for the top 1000 SSIDS. These are a little more portable at on 40MB each.

Hey...WPA brute-forcing on the N900 may not be such a crazy idea after all!

I think this is a thompson speedtouch/bthomehub rainbow table too.

mr_pingu 2011-06-18 13:11

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by vi_ (Post 1031393)
well then, just for you mentalist here are the previous incarnation of said tables. These are 1 million word dictionary tables for the top 1000 SSIDS. These are a little more portable at on 40MB each.

Hey...WPA brute-forcing on the N900 may not be such a crazy idea after all!

I think this is a thompson speedtouch/bthomehub rainbow table too.

Speedtouch keys even WPA can be derived from SSID: stkeys on n900 and speedtouched for windows?

How can these tables be specific for a manufacturer? If we change the password then they fail also, or am I wrong?

vi_ 2011-06-18 13:27

Re: [ announce ] hackattack!
 
Quote:

Originally Posted by mr_pingu (Post 1031402)
Speedtouch keys even WPA can be derived from SSID: stkeys on n900 and speedtouched for windows?

Stkeys USED to work before they changed the algorithm. Now the hex characters at the end of the speedtouch SSID cannot be used to derive the key. However, the key IS still produced from the devices serial number (or something like that). This reduces the potential keyspace significantly. i.e. The length of the key is known, The character set is known and the format of the serial number is known.

Code:

How can these tables be specific for a manufacturer? If we change the password then they fail also, or am I wrong?
I am not sure I understand what you mean. The rainbow table is for a network with that specific SSID. In 'short laymans not really true terms':

WPA key=SHA1SUM(SSID+PASSWORD)

Thus we need a specific table for any given SSID (unlike LANMAN windows table). It has nothing to do with manufacturer, it just so happens than belkin, netgear etc. use their own name as the default SSID and as such that SSID will become one of the most common. In addition to this humans are predictable in their choice of SSID. How many 'skynet's and 'myhome' wifi networks have you seen?

see

and

I love this one, it is like reading a geek thriller.


All times are GMT. The time now is 01:54.

vBulletin® Version 3.8.8