stein Napisano April 2, 2011 Share #23 Napisano April 2, 2011 Impuls internet-hifi-wifi-mobilni pirat! Link to comment Podeli na ovim sajtovima More sharing options...
stefaca Napisano April 2, 2011 Autor Share #24 Napisano April 2, 2011 koliko je net kod impulsa? Link to comment Podeli na ovim sajtovima More sharing options...
zika Napisano April 2, 2011 Share #25 Napisano April 2, 2011 Zar imaš hrabrosti to i da pitaš nekog kome je nick „impuls“...? Link to comment Podeli na ovim sajtovima More sharing options...
stefaca Napisano April 2, 2011 Autor Share #26 Napisano April 2, 2011 izvinjavam se da ne bi bio sprzen Link to comment Podeli na ovim sajtovima More sharing options...
Mikorist Napisano April 2, 2011 Share #27 Napisano April 2, 2011 Wirelessja ne volem Wireless posto znam kako moze da se hack-ne lako.radio to vise puta - testa radi http://www.backtrack-linux.org/daklem - zica je zakon :sarcastic_hand:nema imunog Wireless-a Link to comment Podeli na ovim sajtovima More sharing options...
stefaca Napisano April 2, 2011 Autor Share #28 Napisano April 2, 2011 slazem se ali opet nije bas lako proci pored WPA. WEP je kazu laksi da se prevazidje zato vise niko i ne stavlja WEP sem onih kojima to stoji po defaultu. opet sa druge strane zasto emitovati u etar svoj SSID. sakrij i to pa neka se barem muci. e, ako i to predje neka koristi net par dana posto se mucio tako da ga necu dirati Link to comment Podeli na ovim sajtovima More sharing options...
Mikorist Napisano April 2, 2011 Share #29 Napisano April 2, 2011 slazem se ali opet nije bas lako proci pored WPA. mislis ? Link to comment Podeli na ovim sajtovima More sharing options...
stefaca Napisano April 2, 2011 Autor Share #30 Napisano April 2, 2011 ali opet ovaj skenira kljuc i poredi sa listom kljuceva. sta mislis, iskreno, neki kad krene da skenira, dal ce da ceka 2-3h da izbaci kljuc? ne plasim se.PS.a ti si mi daleko pa ne mozes mi nista Link to comment Podeli na ovim sajtovima More sharing options...
Mikorist Napisano April 2, 2011 Share #31 Napisano April 2, 2011 ali opet ovaj skenira kljuc i poredi sa listom kljuceva. sta mislis, iskreno, neki kad krene da skenira, dal ce da ceka 2-3h da izbaci kljuc? ne plasim se.PS.a ti si mi daleko pa ne mozes mi nista moze i duze da traje ako imas 6 milona reci u recniku p.s Link to comment Podeli na ovim sajtovima More sharing options...
Zen Mod Napisano April 2, 2011 Share #32 Napisano April 2, 2011 jes' mi mali al' je mekan k'o duša:buehehe:nema tog hakera koji na listi reci ima onu rec koju ja koristim za password Link to comment Podeli na ovim sajtovima More sharing options...
Mikorist Napisano April 2, 2011 Share #33 Napisano April 2, 2011 jes' mi mali al' je mekan k'o duša:buehehe:nema tog hakera koji na listi reci ima onu rec koju ja koristim za password meni ne treba recnik da ti provalim password Link to comment Podeli na ovim sajtovima More sharing options...
Zen Mod Napisano April 2, 2011 Share #34 Napisano April 2, 2011 Link to comment Podeli na ovim sajtovima More sharing options...
Mikorist Napisano April 2, 2011 Share #35 Napisano April 2, 2011 http://www.aircrack-ng.org/doku.php?id=korek_chopchop :sarcastic_hand:ovo je samo deo priche.... Link to comment Podeli na ovim sajtovima More sharing options...
Mikorist Napisano April 3, 2011 Share #36 Napisano April 3, 2011 WPA2 crack The researcher who discovered Hole 196, Md Sohail Ahmad, AirTight technology manager, intends to demonstrate it at two conferences taking place in Las Vegas next week: Black Hat Arsenal and DEF CON 18. The Advanced Encryption Standard (AES) derivative on which WPA2 is based has not been cracked and no brute force is required to exploit the vulnerability, Ahmad says. Rather, a stipulation in the standard that allows all clients to receive broadcast traffic from an access point (AP) using a common shared key creates the vulnerability when an authorized user uses the common key in reverse and sends spoofed packets encrypted using the shared group key. Ahmad explains it this way: WPA2 uses two types of keys: 1) Pairwise Transient Key (PTK), which is unique to each client, for protecting unicast traffic; and 2) Group Temporal Key (GTK) to protect broadcast data sent to multiple clients in a network. PTKs can detect address spoofing and data forgery. "GTKs do not have this property," according to page 196 of the IEEE 802.11 standard. These six words comprise the loophole, Ahmad says. Because a client has the GTK protocol for receiving broadcast traffic, the user of that client device could exploit GTK to create its own broadcast packet. From there, clients will respond to the sending MAC address with their own private key information. Ahmad says it took about 10 lines of code in open source MadWiFi driver software, freely available on the Internet, and an off-the-shelf client card for him to spoof the MAC address of the AP, pretending to be the gateway for sending out traffic. Clients who receive the message see the client as the gateway and "respond with PTKs", which are private and which the insider can decrypt, Ahmad explains. From there, "the malicious insider could drop traffic, drop a [denial-of-service] attack, or snoop," Ahmad says. The ability to exploit the vulnerability is limited to authorized users, AirTight says. Still, year-after-year security studies show that insider security breaches continue to be the biggest source of loss to businesses, whether from disgruntled employees or spies who steal and sell confidential data. What can we do about Hole 196? "There's nothing in the standard to upgrade to in order to patch or fix the hole," says Kaustubh Phanse, AirTight's wireless architect who describes Hole 196 as a "zero-day vulnerability that creates a window of opportunity" for exploitation. . izvor:http://www.networkworld.com/newsletters/wireless/2010/072610wireless1.html?page=1 --------- Mass Wifi WEP/WPA Key Cracking Tool Features * sorts targets by power (in dB); cracks closest access points first * all WPA handshakes are backed up (to wifite.py’s working directory) * mid-attack options: stop during attack with Ctrl+C to use (continue, move onto next target, skip to cracking, exit) * numerous filters to specify exactly what to attack (wep/wpa/both, above certain signal strengths, channels, etc) * very customizable settings (timeouts, packets/sec, etc) * SKA support (untested) * finds devices in monitor mode; if none are found, prompts for selection * all passwords saved to log.txt * switching WEP attacks does not reset IVS * displays session summary at exit; shows any cracked keys http://wifite.googlecode.com/svn/trunk/wifite.py --------- ne volem Wireless pogotovo ako se postavljaju na "osetljiva" mesta gde se trazi maksimalna bezbednost. uvek sam napominjao svima kojima sam instalirao to. ko hoce neka mu ja sam na zici ili ako mora zbog zidova i drugih barijera - da se projektuje na taj nachin da je u malom dometu - odnosno u dometu objekata koje pokriva ako imate ludake u blizini da 3 meseca jure pakete da Vam razbucaju wep, onda ste u golemoj nevolji .... za njih se to zove BESPLATAN INTERNET Link to comment Podeli na ovim sajtovima More sharing options...
Preporučeni Komentari
Kreiraj nalog ili se prijavi da daš komentar
Potrebno je da budeš član DiyAudio.rs-a da bi ostavio komentar
Kreiraj nalog
Prijavite se za novi nalog na DiyAudio.rs zajednici. Jednostavno je!
Registruj novi nalogPrijavi se
Već imaš nalog? Prijavi se ovde
Prijavi se odmah