IndeksFAQPendaftaranLoginbtaman bacaanForum TdBlog Semut Nungging

Pengunjung
page counter
Latest topics
» Download software organ tunggal gratis
by Nana80 Wed 29 May 2013, 16:40

» Membuat Background foto sendiri pada Facebook anda
by Tamu Mon 18 Mar 2013, 14:48

» Hosting Download/Upload File mudah, cepat, efisien dan gratis
by Om Jin Sun 17 Mar 2013, 12:57

» Popup Facebook Like Box Dengan Timer CountDown Untuk Blogger
by Om Jin Sat 16 Mar 2013, 17:29

» activator Sim Aquarium 3
by Om Jin Sat 16 Mar 2013, 13:09

» solfware
by sryvika Tue 05 Mar 2013, 08:08

» organ di computer
by nur idris Fri 25 Jan 2013, 17:24

» organ game tunggal
by awex bae Sat 19 Jan 2013, 12:44

Web / Blog Teman
User Yang Sedang Online
Total 6 uses online :: 0 Terdaftar, 0 Tersembunyi dan 6 Tamu

Tidak ada

User online terbanyak adalah 309 pada Wed 07 Dec 2011, 13:06
Info Forum

Page Ranking Tool





Share | 
 

 Wireless Hacking Live-CD (FBI version)

Topik sebelumnya Topik selanjutnya Go down 
PengirimMessage
semut_nunggings
VIP Moderator
VIP Moderator


Jumlah posting : 574
Points : 4083
Join date : 08.10.09

PostSubyek: Wireless Hacking Live-CD (FBI version)   Mon 08 Mar 2010, 14:32




Live Cd For Wireless Hacking, Also Used By The Fbi
This version is for all systems except systems with the Intel B/G wireless cards (IPW2200).
- Live CD with all the tools you need to hack a WLAN / wireless Access point -
Linux Live-CD - OS runs from CD - 635 mb - .iso
- also used by the FBI …

WEP Hacking - The Next Generation

WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.
Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of “strong” encryption while a 128 bit key has 104. The IV is placed in encrypted frame’s header, and is transmitted in plain text.
Traditionally, crac*ing WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packets—a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP crac*ing program such as Aircrac* would be used to find the WEP key.
Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, “It doesn’t matter if you use 128 bit WEP keys, you are vulnerable!”
WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products.
WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.
Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long.
A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of “strong” encryption while a 128 bit key has 104.
The IV is placed in encrypted frame’s header, and is transmitted in plain text.
Traditionally, cracking WEP keys has been a slow and boring process.
An attacker would have to capture hundreds of thousands or millions of packets a process that could take hours or even days, depending on the volume of traffic passing over the wireless network.
After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key.
Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared.
This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours.
Basic Directions:

1)Boot from cd
2)get the wep key
3)write it down
4)reboot into windows
5)connect using wep key.

Download:
Code:
Download part1
Download part2
Download part3
Download part4
Download part5
Download part6
Download part7
Password:
Code:
[You must be registered and logged in to see this link.]


Baca Juga :
- CARA HACK AKUN FACEBOOK TERUPDATE
- CARA CEPAT DI ADD BANYAK CEWEK FB DALAM WAKTU SINGKAT
- MAU PENGHASILAN 100 RIBU/JAM ?
- DI ADD RIBUAN TEMAN FB DALAM WAKTU SINGKAT


Kembali Ke Atas Go down
http://www.it-duduls.com
 

Wireless Hacking Live-CD (FBI version)

Topik sebelumnya Topik selanjutnya Kembali Ke Atas 

 Similar topics

-
» JUAL Wireless System merk ICON [untuk Guitar BASS]
» CBR 600RR Euro Version (no limiter) 2011 hitam mulus
» #WTA Armor anime Date a live
» [SOLD] EFFECT GUITAR LINE6 POD XT LIVE
» Shinobi DVDRip
Halaman 1 dari 1

Permissions in this forum:Anda tidak dapat menjawab topik
Forum Berbagi Om Jin :: INTERNET :: HACKING, CRACKING-