Skip to content

Sokobanja arrow TECHNO ZONEarrow Raèunari i Internetarrow Wireless Hacking Live-CD (FBI version)
07 Decembar, 2021, 05:08:53 pm *
Dobrodosli, Gost. Molim vas prijavite se ili se registrujte.

Prijavite se korisnickim imenom, lozinkom i duzinom sesije
 
   Pocetna   Pomoc Kalendar Prijava Registracija  

Stranice: 1   Idi dole
  Stampaj  
Autor Tema: Wireless Hacking Live-CD (FBI version)  (Procitano 9292 puta)
0 clanova i 1 gost pregledaju ovu temu.
Sale-X
Administrator
Vodeæi tim
*****

Karma: +82/-9
Van mreze Van mreze

Pol: Muskarac
Poruke: 7768


WWW
« Odgovor #3 poslato: 24 April, 2008, 08:01:57 am »

ja bi da hakujem SW, ali kako kad ga nema vec 2,3 dana online. Njih je najverovatnije ponovo uhakovao vetar, tako sto im ponovo slomio pritku na koju im je prikacena antena , zlob, zlob.

 
Sacuvana
« Odgovor #3 poslato: 24 April, 2008, 08:01:57 am »

 Sacuvana
Vassa
Vodeæi tim
*****

Karma: +21/-4
Van mreze Van mreze

Pol: Muskarac
Poruke: 706


« Odgovor #2 poslato: 23 April, 2008, 08:48:08 pm »

Aaa ne bi mi smeli!!  Ipak je Sale-X veci haker od nas.
Sacuvana
Sale-X
Administrator
Vodeæi tim
*****

Karma: +82/-9
Van mreze Van mreze

Pol: Muskarac
Poruke: 7768


WWW
« Odgovor #1 poslato: 23 April, 2008, 07:18:02 pm »

...da hakujete SokoWireless ... :)
Sacuvana
Black-Dragon
Vodeæi tim
*****

Karma: +22/-3
Van mreze Van mreze

Pol: Muskarac
Poruke: 709

Black Dragon


« poslato: 23 April, 2008, 06:26:05 pm »

Wireless Hacking Live-CD (FBI version)



Wireless Hacking Live-CD (FBI version)
Live Cd For Wireless Hacking, Also Used By The Fbi. This version is for all systems except systems with the Intel B/G wireless cards (IPW2200). Live CD with all the tools you need to hack a WLAN / wireless Access point - Linux Live-CD - OS runs from CD - 635 mb - .iso - also used by the FBI …
WEP Hacking - The Next Generation

WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.
Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of ‚Äústrong‚ÄĚ encryption while a 128 bit key has 104. The IV is placed in encrypted frame‚Äôs header, and is transmitted in plain text.
Traditionally, crac*ing WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packets√Ę‚ā¨‚ÄĚa process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP crac*ing program such as Aircrac* would be used to find the WEP key.
Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, ‚ÄúIt doesn‚Äôt matter if you use 128 bit WEP keys, you are vulnerable!‚ÄĚ
WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products.
WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.
Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long.
A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of ‚Äústrong‚ÄĚ encryption while a 128 bit key has 104.
The IV is placed in encrypted frame’s header, and is transmitted in plain text.
Traditionally, cracking WEP keys has been a slow and boring process.
An attacker would have to capture hundreds of thousands or millions of packets a process that could take hours or even days, depending on the volume of traffic passing over the wireless network.
After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key.
Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared.
This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours.
Basic Directions:

1)Boot from cd
2)get the wep key
3)write it down
4)reboot into windows
5)connect using wep key.

DOWNLOAD
Kod:
http://rapidshare.com/files/102965923/FBI_wireless_hacking.part1.rar
http://rapidshare.com/files/102968017/FBI_wireless_hacking.part2.rar
http://rapidshare.com/files/102968395/FBI_wireless_hacking.part3.rar
http://rapidshare.com/files/102968417/FBI_wireless_hacking.part4.rar
http://rapidshare.com/files/102970245/FBI_wireless_hacking.part5.rar
http://rapidshare.com/files/102970700/FBI_wireless_hacking.part6.rar
http://rapidshare.com/files/102969710/FBI_wireless_hacking.part7.rar

evo linkovi su promenjeni......Za sada rade
« Poslednja izmena: 20 Mart, 2009, 10:49:28 pm Scorpion-Dark » Sacuvana
   

 Sacuvana
Stranice: 1   Idi gore
  Stampaj  
 
Prebaci se na:  

Pokrece MySQL Pokrece PHP Powered by SMF 1.1.9 | SMF © 2006, Simple Machines LLC
Joomla Bridge by JoomlaHacks.com
Ispravan XHTML 1.0! Ispravan CSS!

Statistika

Na sajtu su trenutno 0 gost/a i 0 clan/a.
mod_vvisit_counterDanas231
mod_vvisit_counterJuce249
mod_vvisit_counterOve nedelje480
mod_vvisit_counterOvog meseca2140