Forum pracy nad projektem wskrzeszenia The Forge Forum Index Forum pracy nad projektem wskrzeszenia The Forge

 
 FAQFAQ   SearchSearch   MemberlistMemberlist   UsergroupsUsergroups   GalleriesGalleries   RegisterRegister 
 ProfileProfile   Log in to check your private messagesLog in to check your private messages   Log inLog in 

# # # Wireless network WEP WPA key

 
Post new topic   Reply to topic    Forum pracy nad projektem wskrzeszenia The Forge Forum Index -> Forum
View previous topic :: View next topic  
Author Message
fasfsdas
Cholerny Spammer



Joined: 25 Sep 2010
Posts: 5145
Read: 0 topics

Location: England

PostPosted: Tue 4:03, 23 Nov 2010    Post subject: # # # Wireless network WEP WPA key

From the Red Hacker Alliance
sniffing tools based on 802.11, with *** wep key functions
1,[link widoczny dla zalogowanych], *** About
WinAirCrackPack software kit is a wireless LAN scanning and key *** tools, including tools such as airodump and aircrack. It can monitor the wireless network to transmit data, data collection package, and calculate the WEP / WPA key.
4, configure the wireless router (based on the actual network environment to configure)
(1) STA1 connected to the wireless router (the default is not encrypted.) Right-click the icon below the screen, select \
which shows a number of available wireless networks,[link widoczny dla zalogowanych], double-click the TP-LINK wireless router connected, while on the connection is successful.
(2) Open the IE browser, enter the IP address: 192.168.1.1 ( wireless router default LAN IP address).
(3) wireless router management interface login (user name: admin, password: admin).
click interface on the left of the \
(4) Open the IE browser, enter the IP address: 192.168.1.8, log back in Wireless Router Management Interface (note that this was chosen for TP-LINK wireless router, other brands have similar products, such as CISCO and other configuration options), Click the interface on the left of the \
1) Select the \ \
(5) When the wireless router set up after the WEP key, STA1 need to re-connect to the wireless router (the key input key and a wireless router set the same), while on the connection is successful.
(6) Open IE browser, enter the IP address: 192.168.1.8, log wireless router management interface, click the interface on the left of the \ \
5, *** WEP, WPA key software download
[link widoczny dla zalogowanych]
3, experimental topology
slightly.
(www.7747.net) Original: [link widoczny dla zalogowanych]
8, *** WPA key
(1) modify the wireless router's encryption type and encryption method, and is set to WPA-PSK authentication and TKIP encryption.
(2) runs in laptop STA3 airodump, the tool used to capture packets, follow the prompts to select \ n \
(3) Enter, enter the following interface
(4) reconnect to the wireless router STA1, airodump will capture a wireless router and STA1 four- way handshake process.
(5) Start WinAircrack.
(6) Click the left side of the \
(7) Click the left side of the \
(Cool After all the settings, click the bottom right corner of the \
(9) to select *** network BSSID (this experiment select \
Our purpose of this experiment is to capture the appropriate data through the frame IV (initialization vector) Violence *** get WEP KEY, it only need to use airodump.exe (used to capture data frame) and WinAircrack.exe ( *** WEP KEY with) two programs on it
aircrack.exe WIN32 version of the original aircrack program
airdecap.exe WEP / WPA data frame decoding process
airodump.exe capture process
Updater.exe WIN32 version of aircrack The upgrade version of aircrack
WinAircrack.exe WIN32 graphical front-end
wzcook.exe local wireless network card cache WEPKEY logger
2, experimental environment, system components
2.1 hardware environment
use WPA encryption with WEP and the wireless router or AP
with a Centrino laptop wireless card two (respectively defined as STA1 and STA2, wireless access as a legitimate user)
Ethereal
laptop wireless card a one (defined as STA3, as the intruder)
2.2 software environment
invaders STA3: WinAirCrackPack Kit,
Note: STA3 To open the Control Panel - \
6,[link widoczny dla zalogowanych], wireless network card installed Ethereal
Note: Wireless network card driver for packet capture with Atheros v4.2.1, the card must be used Atheros AR5001, AR5002, AR5004, AR5005 or AR5006 chipsets, network cards under the table can be used, this study, we used the 108M wireless card Netgear (Model: WG511T).
(1) get caught in the STA3 laptop wireless card driver is installed. Insert the wireless network card, the pop-up window shown in Figure 11. Select \
(2) Select \
(3) Select \
(4) Click \ Click \
7, *** WEP key
(1) to STA1 and STA2 reconnect to the wireless router.
(2) notebook computer running at STA3 airodump, the tool used to capture packets, follow the prompts to select \, where the choice atheros chip;
\ any);
\
(3) Enter, enter the following interface.
(4) when the AP is extremely frequent communication data traffic (for example, STA1 and STA2 can Duikao file to generate data traffic), \ When caught about 30 million (104-bit RC4 encryption, such as required use of catches 100 million package) \
(5) Click the left side of the \
(6) Click the left side of the \
( 7) After all the settings, click the bottom right corner of the \
(Cool to select *** network BSSID (In this study, select \
9,[link widoczny dla zalogowanych], *** the harm to the network after the key case of (fake AP)
Once the intruder knows the WEP or WPA wireless network key, you can connect to the local LAN, so intruders to enjoy As with normal access to the user access rights to the entire network, in-depth attack. Intruders can use IPBOOK, SuperScan tool like this and other LAN scanning the computer, the computer inside the files, directories, or entire hard drive can be copied or deleted, or even worse, other cases such as keyloggers, Trojan horses, spyware, program or other malicious programs, and so can be installed on your system, so the consequences are very serious.
(1) Introduction to WEP or WPA password when
been ***, the intruder may use the password and other wireless access point (AP) constructed a fake network, the signal strength when the camouflage of normal AP AP AP camouflage or user close to, the normal user will naturally leave access to the network, the user is in itself not feel the network to send and receive messages in the normal user, we can use similar tools such CAIN for POP3, telnet, etc., etc. *** password attacks.
(2) POP3 password ***
1) Open CAIN.
2) Click on the menu bar \
3) select a network adapter will be used for packet capture, click \
4) normal user starts the mail, the software can mail login name and password capture.
(3) the harm after being ***
when hackers your mailbox user name, password, POP3 server and SMTP server's IP address , you can directly access your mailbox, your e-mail information will be fully exposed to the hackers before.


The post has been approved 0 times
Back to top
View user's profile
Display posts from previous:   
Post new topic   Reply to topic    Forum pracy nad projektem wskrzeszenia The Forge Forum Index -> Forum All times are GMT + 2 Hours
Page 1 of 1

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum

fora.pl - załóż własne forum dyskusyjne za darmo
Powered by phpBB © 2001, 2005 phpBB Group
Regulamin