Notices


Reply
Thread Tools
Posts: 13 | Thanked: 8 times | Joined on Oct 2010
#1061
Originally Posted by Estel View Post
Wrong. N900 is perfectly able to "crack" WPA2 password in reasonable time, if given good enough Rainbow Table for given SSID. I used term "crack" in quotes, cause via Rainbow Tables, most computing work is done *before* actual attack (without need for things like handshake - only SSID), on big machine(s), for weeks or even months. Sure, doing rest of computation on N900 (and checking all hashes) will be slower than on 2500 mHz Core2Duo, but it's nothing like lifetime or even weeks

What You're talking about, is probably bruteforcing password, which is more than lifetime (for strong passwords) even for big machines, or clouds of big machines Rainbow Tables are different thing - some kind of compromise between storage needed and computational power required. More info can be found on Wikipedia. Well, for scope of this post is enough to say, that they don't call it Rainbow Tables without purpose
You appear to be a young lad with little knowledge and big ideas that wont work. Will you care to explain to everyone how you can use Rainbow tables to crack anything with an ESSID which hasn't already been precomputed. In the real world that will be nearly all of them. In any case using Rainbow tables still requires much more resources than the N900 has. Rainbow tables are so yesterday
 
Estel's Avatar
Posts: 5,028 | Thanked: 8,613 times | Joined on Mar 2011
#1062
I don't see point in Your personal attacks/arrogance. Just in case for further posts, I prefer meritocratic arguments, and enjoy constructive critic

That said - constructive. Everything You've pointed out as my mistakes was written in my last post, really 0_o. I clearly said that Rainbow tables are precomputed before (for weeks, or even months). Still, using them after that is same for N900 or desktop computer or notebook, except speed difference in doing remaining computing work, and browsing through partially generated passwords.

I really don't like to "quote myself" - it was all written in my last post. Even things about resources in N900 and possibility to use hostmode and huge "spinning disks" HDs. Mix it with pre-computing Rainbow Tables for any network SSID You like (prepared attack, for example using relatively cheap but powerful 4x AMD graphic cards setup via CLI, same as for BitCoins generating), and You can perform active "attack" with N900, if You really want to do so.

I don't argue with fact that it's mostly proof-of-concept thing (although, using N900 got advantage of security through obscurity - almost no one except "phone" to do such things, while guy-with-a-laptop is much more "suspicious"), yet still, it proves your FUD, autocratic assumptions ("impossible, EOT") plain wrong. By the way, we're jusgt proof-of-concept'ing here, right? I don't think someone hacking networks as daily work would be stupid enough to write advices here. Or, at least, to not guise it as pentesting

Respect,

/Estel

Ps.

I really like "yesterday" stuff. Especially, when they work fine
__________________
N900's aluminum backcover / body replacement
-
N900's HDMI-Out
-
Camera cover MOD
-
Measure battery's real capacity on-device
-
TrueCrypt 7.1 | ereswap | bnf
-
Hardware's mods research is costly. To support my work, please consider donating. Thank You!

Last edited by Estel; 2011-08-11 at 23:30.
 
Posts: 13 | Thanked: 8 times | Joined on Oct 2010
#1063
Estel, What i don't like about your posts is the fact that you clearly don't know what you are talking about and others may be misled by your nonsense. Its your fault for uttering them and the fact that I have picked you up over it.

I know how to crack WPA and have done it, I can assure you that the nonsense of any belief that the N900 can do in a real world situation is beyond any credibility.
WPA can be cracked but not on a N900 that was always the case and that will always be the case no matter what imaginations your mind might invent. The only known real world way to crack WPA is with a brute force dictionary attack. This means you need a large dictionary in the hope that in it somewhere will the be the passwd you are trying to find, if it isn't you are doomed to failure. Together with this you need a computer with a decent GPU, mine has 2 GPU's and you probably would be best to use Pyrit.

This quote is from the pyrit Web-page :-

Attacking WPA/WPA2 by brute-force boils down to to computing Pairwise Master Keys as fast as possible. Every Pairwise Master Key is 'worth' exactly one megabyte of data getting pushed through PBKDF2-HMAC-SHA1. In turn, computing 10.000 PMKs per second is equivalent to hashing 9,8 gigabyte of data with SHA1 in one second. The following graph shows various performance numbers measured on platforms supported by Pyrit.

In short Estel your ideas and comments about the ability of the N900 being able to crack WPA is Pure Bollocks

My computer does 180000 PMK's per second and takes about an hour to process the ESSID to compute all the Pairwise Master Keys, it also makes a very efficient room heater in the process because the 1 kilowatt computer power supply is being heavily used.After I still have to process all the Pairwise Master Keys against the dictionary.

Last edited by Trine; 2011-08-12 at 19:19.
 
Estel's Avatar
Posts: 5,028 | Thanked: 8,613 times | Joined on Mar 2011
#1064
Originally Posted by Trine View Post

I know how to crack WPA and have done it, I can assure you that the nonsense of any belief that the N900 can do in a real world situation is beyond any credibility.
WPA can be cracked but not on a N900 that was always the case and that will always be the case no matter what imaginations your mind might invent. The only known real world way to crack WPA is with a brute force dictionary attack. This means you need a large dictionary in the hope that in it somewhere will the be the passwd you are trying to find, if it isn't you are doomed to failure.
What i *love* about your post, is pile of authoritative statements, without *any* argumentations to back it up. Not to mention counter-argument for what other people said, if You don't agree. I presume that Your opposite opinion is all what You need to prove Your way of thinking right, so, I'll not try to kill that happiness on You

Lets just eot here and stick to our experiences and "yesterday" stuff - no sense in another flamewar. Especially, that everything worth to say on this topic, was said already, and repeating same things over and over is no-fun (You reminds me of epitaph, a little - he was also just purely denying to acknowledge basic things, but, again, lets not feed trolls out of wood...)

Respect,

/Estel
__________________
N900's aluminum backcover / body replacement
-
N900's HDMI-Out
-
Camera cover MOD
-
Measure battery's real capacity on-device
-
TrueCrypt 7.1 | ereswap | bnf
-
Hardware's mods research is costly. To support my work, please consider donating. Thank You!
 
Posts: 1 | Thanked: 0 times | Joined on Aug 2011
#1065
Hello crackers.
I have download the fAirCrack and now I try to install these but with X-terminal don't work it.
When I follow the install guide the is the first rule cd MyDocs and thats all.
every next rule gives an wrong answer.
"can't cd to wl1251-maemo"
what can I do or what I'm doing wrong?
please who will give me an answer or a site/page where I can find this problems.
Thanks
 
Estel's Avatar
Posts: 5,028 | Thanked: 8,613 times | Joined on Mar 2011
#1066
Obviously, You don't have directory wl1251-maemo on MyDcos, which mean, that You don't have lxp bleeding edge drivers installed. Read instructions carefully again, and you'll be good to go
__________________
N900's aluminum backcover / body replacement
-
N900's HDMI-Out
-
Camera cover MOD
-
Measure battery's real capacity on-device
-
TrueCrypt 7.1 | ereswap | bnf
-
Hardware's mods research is costly. To support my work, please consider donating. Thank You!
 
kingoddball's Avatar
Posts: 1,187 | Thanked: 816 times | Joined on Apr 2010 @ Australia
#1067
Peoples: Here is an installer.
Just open page and follow the SIMPLE two step guide.
It will install all including WL1.

Then just upgrade to newer FAS files on this page.

http://talk.maemo.org/showthread.php...40#post1073840
__________________
The thanks button? Sure! You can press it! I would!
 

The Following User Says Thank You to kingoddball For This Useful Post:
myself_v1's Avatar
Posts: 13 | Thanked: 1 time | Joined on Aug 2011 @ Padova
#1068
I'm having an issuse... if i push Enable it wont Enable monitor Mode and if i push Random Mac Adresse it wont give me notthing...

even in the access point tab when i press WPA and then SCAN it won't scan (it's supposed to be in monitor mode isn't it?)


... how can i fix ?
 
StefanL's Avatar
Posts: 298 | Thanked: 341 times | Joined on Aug 2010 @ This world :)
#1069
Originally Posted by myself_v1 View Post
I'm having an issuse... if i push Enable it wont Enable monitor Mode and if i push Random Mac Adresse it wont give me notthing...

even in the access point tab when i press WPA and then SCAN it won't scan (it's supposed to be in monitor mode isn't it?)


... how can i fix ?
Sounds like you do not have the right bits (mainly power kernel 46). Check post no. 1 for requirements.
__________________
My phone evolution: Nokia 7610 (RIP), N82 (RIP), BB9000 (RIP), N900, BB9760 (RIP), N8, BB9900, N9 64GB
Working : Python Gorillas (Maemo5) Faircrack0.50 Update (Maemo5)
Not so much : WPScrack (Maemo5)
 
Estel's Avatar
Posts: 5,028 | Thanked: 8,613 times | Joined on Mar 2011
#1070
Hi there Stefan! Are You committing patches to Cleven, as You've planned, or are You working on fAircrack? I hope You didn't give it up - if You don't feel ok working on Cleven to create one full featured solution (cause now both fAircrack and Cleven lack something), there are still many people interested in fAircrack. Anyway, I'm using it daily, and probably won't switch to Cleven without You joining it's team

Just saying, to let You know that Your work is missed.

/Estel
__________________
N900's aluminum backcover / body replacement
-
N900's HDMI-Out
-
Camera cover MOD
-
Measure battery's real capacity on-device
-
TrueCrypt 7.1 | ereswap | bnf
-
Hardware's mods research is costly. To support my work, please consider donating. Thank You!
 

The Following 3 Users Say Thank You to Estel For This Useful Post:
Reply

Tags
aircrack, aircrack-ng, epicfacepalm, pen testing, rtfm dude!


 
Forum Jump


All times are GMT. The time now is 03:31.