![]() |
Re: [ announce ] hackattack!
Oh i actually just noticed this thread is here
just a bottom line N900 can hack WEP easily N900 can hack WPA hardly using rainbow tables N900 can't hack WPA with normal handshake (it will take for ever) BUT N900 can hack WPA easily with easy-debian after installing dhcp3 apache2 apache2-mod-php5 and aircrack-ng suit also iptables and iproute then simply create a fake ap with dhcp3 server and apache2 and in addition to a phisher web page wich has the same bssid and esside of the target (but not he same channel) then i DOS the orginal AP so the target will automaticly connects to my fake ap ( windows problem) in my case i use a fake web page telling the owner that a new firmware has been installed to his router (i know the type of his router with kismet) to create the perfect phisher and a reconfigure of wep/wpa key is required so when he enters the key i get it directly to my n900 That is my way to hack WPA with N900 PS: just linked this thread in my thread soon with these beautiful threads we would have a super N900 |
Re: [ announce ] hackattack!
Lol at the social engineering approach. That's always fun.
In the meantime, I think if you have access to some 3G internet and have a server running at home you can SSH into, you should be more that able to launch more hardcore attacks against WPA networks that don't fall prey to your basic on-board rainbow tables. One thing of possible concern: http://forum.aircrack-ng.org/index.php?topic=5965.0 Looks like the tables provided by Offensive Security have a bunch of invalid passwords. Well, that post is from 2009 so that may have changed by now, but figured I'd mention it and if anyone knows better, they can speak up. |
Re: [ announce ] hackattack!
[QUOTE=zozeta2;1031386]
Quote:
you care to share your metaspliots with us then ?? |
Re: [ announce ] hackattack!
there is an exploit (not public) with wpa/wpa2 system
i forgot what is it called wich allows to easily hack wpa just like wep PS: IT IS NOT TKIPTUN-NG (another one) but it is the reason that they will launch another security system maybe 2013 |
Re: [ announce ] hackattack!
Here is my output :
Code:
BusyBox v1.10.2 (Debian 3:1.10.2.legal-1osso30+0m5) built-in shell (ash) and i have to close xterm and open it again to be able to type 'wepoff' N.B: Thats of course for scientifical and geological purposes only |
Re: [ announce ] hackattack!
Quote:
Sorry but I can't really think about any cause for your problem, if you have carefully followed the guide and you're using the modified kernel-power or kernel-power v47 wifite should work properly, you are the first encountering problems. :confused: |
Re: [ announce ] hackattack!
Quote:
Is there a way that i can choose which network i can crack ? so it doesn't auto. choose home3 ? |
Re: [ announce ] hackattack!
Yes. edit the 'wepon' script. comment out the line that puts the device into monitor mode. This will force wifite to put your card into monitor mode (didnt work right for me, apparently worked for mr_pingu).
This will cause wifite to enter a different scan mode and allow network selection. |
Re: [ announce ] hackattack!
1 Attachment(s)
hi
after 10 h of playing with my n900 ( flash and install all ...) i manage to instal the script but ... |
Re: [ announce ] hackattack!
I'm now stuck with arp replay attack on XXXX captured # ivs
then chop-chop attack what is wrong here ? |
All times are GMT. The time now is 02:14. |
vBulletin® Version 3.8.8