Notices


Reply
Thread Tools
StefanL's Avatar
Posts: 298 | Thanked: 341 times | Joined on Aug 2010 @ This world :)
#1041
Originally Posted by stevomanu View Post
have update today many thanks for that ,but i was wandering why this feature is not in the updated version ..

packet broadcast injection button for WEP

if not can you maybe add it in next release please
Thanks for pointing this one out again, I have now added it to the next version. When I am not so busy anymore, I will go back through all the posts in this thread to see if there are any suggestions that should be in the program.
__________________
My phone evolution: Nokia 7610 (RIP), N82 (RIP), BB9000 (RIP), N900, BB9760 (RIP), N8, BB9900, N9 64GB
Working : Python Gorillas (Maemo5) Faircrack0.50 Update (Maemo5)
Not so much : WPScrack (Maemo5)
 

The Following 2 Users Say Thank You to StefanL For This Useful Post:
StefanL's Avatar
Posts: 298 | Thanked: 341 times | Joined on Aug 2010 @ This world :)
#1042
Originally Posted by colla84 View Post
how to?

for driver installation i have found this application :wlan driver applet

it have same fuction like wifiswitcher and load driver edge (wlxxx) or driver stock with tap....


so i have installed atm but dont see if drivers are correctly installed!
this program download driver and use it !
I will put together a small howto with the next version.

The rest of the post, idkwtfuta , sorry, I just can't understand what you need there .
__________________
My phone evolution: Nokia 7610 (RIP), N82 (RIP), BB9000 (RIP), N900, BB9760 (RIP), N8, BB9900, N9 64GB
Working : Python Gorillas (Maemo5) Faircrack0.50 Update (Maemo5)
Not so much : WPScrack (Maemo5)
 
Posts: 87 | Thanked: 4 times | Joined on Sep 2010
#1043
yes, a guide for that will be good ^^


for the moment i have found a lot dictionaries.. 5mb
(names,region,countries,numbers etc) but the question is.... when you try to find keys... they keys must be in our dictionaries... so in the new wpa2 with a lot letters and numbers (like the mine linea wifi, i try to hack it ^^) how we can? seems impossibile to hack!!!!

But someone tell me, nothing is impossible!!
So, all dictionaries of the world are poor, and the only hope is people change their longest password with a possibile password.
 
Estel's Avatar
Posts: 5,028 | Thanked: 8,613 times | Joined on Mar 2011
#1044
5 mb dictionary is lot? Even 5GB is very small, and 50 GB is just moderate one. Unless we are talking about different type of dictionary - i.e You're assuming that wpa/wpa2 ap admin is idiot, and set his wife name as password.

Just keep in mind, that it's most unlikely - people bright enough to change default passwords (or even wep to wpa), are - most of the times - bright enough to not use very dumb passwords.
__________________
N900's aluminum backcover / body replacement
-
N900's HDMI-Out
-
Camera cover MOD
-
Measure battery's real capacity on-device
-
TrueCrypt 7.1 | ereswap | bnf
-
Hardware's mods research is costly. To support my work, please consider donating. Thank You!
 

The Following 2 Users Say Thank You to Estel For This Useful Post:
Posts: 13 | Thanked: 8 times | Joined on Oct 2010
#1045
There is ABSOLUTELY no chance the N900 can crack WPA so will people stop believing it can be on the N900.

The ONLY way to crack WPA is by a brute force attack using a large dictionary and even then if the password is not in the dictionary you will NOT be able to crack WPA.

A reasonable size dictionary for cracking WPA is going to be about 13 gigabytes in size. In order to be able to use such a large size of dictionary you will need hardware vastly superior to the N900.

So the real world reality is you CANNOT crack WPA with an N900.

The best you could do is to collect the 4Way handshake with the N900 and use that later on a much faster machine which has GPU's installed in it.

What is required from the N900 and faircrack is the ability to deauth the client because without that option you will have to wait for a client to reconnect which could be days instead of just seconds if you could force a deauth.

It is as simple as that, sorry to be the bringer of bad news to some of you who mistakenly thought the N900 would be able to realistically crack WPA because it cant.
 

The Following 5 Users Say Thank You to Trine For This Useful Post:
StefanL's Avatar
Posts: 298 | Thanked: 341 times | Joined on Aug 2010 @ This world :)
#1046
Originally Posted by Trine View Post
There is ABSOLUTELY no chance the N900 can crack WPA so will people stop believing it can be on the N900.

The ONLY way to crack WPA is by a brute force attack using a large dictionary and even then if the password is not in the dictionary you will NOT be able to crack WPA.

A reasonable size dictionary for cracking WPA is going to be about 13 gigabytes in size. In order to be able to use such a large size of dictionary you will need hardware vastly superior to the N900.

So the real world reality is you CANNOT crack WPA with an N900.

The best you could do is to collect the 4Way handshake with the N900 and use that later on a much faster machine which has GPU's installed in it.

What is required from the N900 and faircrack is the ability to deauth the client because without that option you will have to wait for a client to reconnect which could be days instead of just seconds if you could force a deauth.

It is as simple as that, sorry to be the bringer of bad news to some of you who mistakenly thought the N900 would be able to realistically crack WPA because it cant.
Yep, I think I agree, however I am working this fAircrack thingy because:

1) I can.
2) It's there.
3) I am bored.
4) Is just an academic excercise for me.
5) I don't mind learning new stuff's and teaching me python, linux, packaging, etc.

(ie. I am not going to stop now just because it will not do 1 particular thing, btw. there is already a much nicer gui than this one out, I think he has been reading this thread ).

Anyway, this tool is not to be used for cracking, but penetration testing, and as far as I am concerned, it does not hurt to make as many features of aircrack-ng available in the gui as possible.

Just think, if you combine this tool with some social engineering, the required password list can be fairly limited and quite manageable on the N900. Ooooooops, did I just say that!
__________________
My phone evolution: Nokia 7610 (RIP), N82 (RIP), BB9000 (RIP), N900, BB9760 (RIP), N8, BB9900, N9 64GB
Working : Python Gorillas (Maemo5) Faircrack0.50 Update (Maemo5)
Not so much : WPScrack (Maemo5)
 

The Following 5 Users Say Thank You to StefanL For This Useful Post:
Posts: 2,225 | Thanked: 3,822 times | Joined on Jun 2010 @ Florida
#1047
Just one technicality - you don't need a dictionary for brute-forcing - the dictionary just speeds things up. If you run through your hypothetical huge dictionary on your hypothetical supercomputer, and didn't get the key, you just start computing "passwords" in order (if the programs used are smart, it'll not check the passwords it already saw in the dictionary).

Honestly, the 'create random string that's a valid WPA key' is a lot faster than calculating the 4 way handshake from the string, so brute forcing from dictionary isn't even that much faster than brute forcing from nothing. Dictionaries speed things up by containing commonly used keys/passwords, so statistically you're more likely to hit what you want, instead of checking valid-but-unlikely possible keys like AAAAAAAAAAAAB, AAAAAAAAAAAAC, etc - but the actual cracking speed should be similar (i.e. essentially equally slow).
 

The Following 4 Users Say Thank You to Mentalist Traceur For This Useful Post:
Posts: 1,680 | Thanked: 3,685 times | Joined on Jan 2011
#1048
Originally Posted by Mentalist Traceur View Post
...AAAAAAAAAAAAB...
Holy sh|t bro, you guessed my pass!

But seriously why is there so much bull in this thread?

***ahem***rainbow tables***ahem***
***ahem***cowpatty***ahem***
__________________
N900: One of God's own prototypes. A high-powered mutant of some kind never even considered for mass production. Too weird to live, and too rare to die.
 

The Following 3 Users Say Thank You to vi_ For This Useful Post:
StefanL's Avatar
Posts: 298 | Thanked: 341 times | Joined on Aug 2010 @ This world :)
#1049
Originally Posted by vi_ View Post
Holy sh|t bro, you guessed my pass!

But seriously why is there so much bull in this thread?

***ahem***rainbow tables***ahem***
***ahem***cowpatty***ahem***
Yeah, nfi.
__________________
My phone evolution: Nokia 7610 (RIP), N82 (RIP), BB9000 (RIP), N900, BB9760 (RIP), N8, BB9900, N9 64GB
Working : Python Gorillas (Maemo5) Faircrack0.50 Update (Maemo5)
Not so much : WPScrack (Maemo5)
 

The Following User Says Thank You to StefanL For This Useful Post:
Posts: 105 | Thanked: 87 times | Joined on Jun 2011 @ Unknown
#1050
Originally Posted by StefanL View Post
Thanks for pointing this one out again, I have now added it to the next version. When I am not so busy anymore, I will go back through all the posts in this thread to see if there are any suggestions that should be in the program.
Wat about the wep hiden networks do you think that can be added to the next version ?
 
Reply

Tags
aircrack, aircrack-ng, epicfacepalm, pen testing, rtfm dude!

Thread Tools

 
Forum Jump


All times are GMT. The time now is 03:40.