Wifite v2 support for cracking WPS-encrypted networks (via reaver), v2 new WEP attacks, more accurate WPA handshake capture, various bug fixes. Version 2 does not include a GUI, so everything must be done at the command-line. Designed and tested on Linux; works with Backtrack 5, BlackBuntu, BackBox, and Pentoo! Linux only; no windows or OSX support (but you’re welcome to try). Wifite was mentioned in the New York Times’ article “New Hacking Tools Pose Bigger Threats to Wi-Fi Users” Here is a link to the article.
Obsah kategorie pro 'Crack'
As the market with CPU has moved to multi-core solutions as a alternative method to increase computation power, intensive computing applications are not adapting to this fact so quickly. A Lot of people still don’t know that the system is not able to split tasks into more threads and distribute the work evenly upon the cores. This task is on the application developer who has to implement the multi-thread supporting mechanism.
There is a nice modified version of aircrack-ng I found on their website aircrack-ng.org. It is optimized for CPUs with the SSE2 instruction set (what is SSE2?). For classic dictionary attack on WPA key, it is able to speed things up to 500% compared a not optimized version. I made a test using BackTrack 3 with CPU Intel Core2Duo P8400 2.26 GHz, cowpatty 4.3, aircrack-ng 1.0 rc1 and aircrack-ng-wpa-sse2. For this test I will use a dictionary and a handshake (wpapsk-linksys.dump) from Cowpatty package. The results are on the screenshots.
Before we start, the 700 MB ISO image which is mentioned in the news is the stripped to fit onto a CD. The Full version of BackTrack 3 Beta is 1 GB big, named as the USB version. It can only be installed on a Flash disk or be burnt onto a DVD with some modifications. This article is a simple guide to a Flash disk instalation. Acording to available information, the lowest capacity of flash this version of BackTrack has been tested on is 2 GB.
This is second part of pentesting how to (Ultimate Ubuntu Guide). Lessons from 1 to 9 you can find at How to crack WEP. In this part we ‘ll continue with technique called korek chopchop attack, wep key cracking, aireplay-ng examples, rejects open-system authentication, packetforge-ng, 5GHz band (including frequency and modularity information) , WPA (WPA-PSK) cracking abstrack, connecting to network (gateway, internet) and epilogue
Web pages are protecting it selfs from spammers by system called captcha (Completely Automated Public Turing test to tell Computers and Humans Apart). It is a test that decide if page is viewed by human or bot. Today it’s notorously known. Recongizing symbols from image, counting numbers or decide which picture doesn’t match with others. Captcha shouldn’t require any knowledge from user because that would only decide how much is user educated but doesn’t determine if is huma or not.
New lzm pack released. What is Aircrack? Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools. In fact, Aircrack-ng is a set of tools for auditing wireless networks.
Linux application cracking. What for it is? Primarily the application run can be understund. Not all Linux software is free (Macintos ? :). That could be for someone a challange and he can “converte” the application on freeware.
This experience can be used on other systems (Windows). With this knowledge you will be able to precisely tune applications and gain control on new boxes.