Forum Turniej Pokemon

 
 FAQFAQ   SzukajSzukaj   UżytkownicyUżytkownicy   GrupyGrupy  GalerieGalerie   RejestracjaRejestracja 
 ProfilProfil   Zaloguj się, by sprawdzić wiadomościZaloguj się, by sprawdzić wiadomości   ZalogujZaloguj 

# # # Wireless network WEP WPA key

 
Napisz nowy temat   Odpowiedz do tematu    Forum Turniej Pokemon Strona Główna -> Arena Wody
Zobacz poprzedni temat :: Zobacz następny temat  
Autor Wiadomość
csdgtwrrt




Dołączył: 25 Wrz 2010
Posty: 4907
Przeczytał: 0 tematów

Ostrzeżeń: 0/5
Skąd: England

PostWysłany: Pią 11:42, 03 Gru 2010    Temat postu: # # # Wireless network WEP WPA key

(www.7747.net) Original: [link widoczny dla zalogowanych]
aircrack.exe WIN32 version of the original aircrack program
airdecap.exe WEP / WPA data frame decoding process
airodump.exe capture process
Updater.exe WIN32 version of aircrack The upgrade version of aircrack
WinAircrack.exe WIN32 graphical front-end
wzcook.exe local wireless network card cache WEPKEY logger
sniffing tools based on 802.11, with *** wep key functions
8, *** WPA key
(1) modify the wireless router's encryption type and encryption method, and is set to WPA-PSK authentication and TKIP encryption.
(2) runs in laptop STA3 airodump, the tool used to capture packets, follow the prompts to select \ n \
(3) Enter, enter the following interface
(4) reconnect to the wireless router STA1, airodump will capture a wireless router and STA1 four- way handshake process.
(5) Start WinAircrack.
(6) Click the left side of the \
(7) Click the left side of the \
(Cool After all the settings, click the bottom right corner of the \
(9) to select *** network BSSID (this experiment select \
1, *** About
WinAirCrackPack software kit is a wireless LAN scanning and key *** tools, including tools such as airodump and aircrack. It can monitor the wireless network to transmit data, data collection package, and calculate the WEP / WPA key.
3, experimental topology
slightly.
6, wireless network card installed Ethereal
Note: Wireless network card driver for packet capture with Atheros v4.2.1, the card must be used Atheros AR5001, AR5002, AR5004, AR5005 or AR5006 chipsets, network cards under the table can be used, this study, we used the 108M wireless card Netgear (Model: WG511T).
(1) get caught in the STA3 laptop wireless card driver is installed. Insert the wireless network card, the pop-up window shown in Figure 11. Select \
(2) Select \
(3) Select \
(4) Click \ Click \
7, *** WEP key
(1) to STA1 and STA2 reconnect to the wireless router.
(2) notebook computer running at STA3 airodump, the tool used to capture packets, follow the prompts to select \, where the choice atheros chip;
\ any);
\
(3) Enter, enter the following interface.
(4) when the AP is extremely frequent communication data traffic (for example, STA1 and STA2 can Duikao file to generate data traffic),[link widoczny dla zalogowanych], \ When caught about 30 million (104-bit RC4 encryption, such as required use of catches 100 million package) \
(5) Click the left side of the \
(6) Click the left side of the \
( 7) After all the settings, click the bottom right corner of the \
(Cool to select *** network BSSID (In this study,[link widoczny dla zalogowanych], select \
From the Red Hacker Alliance
4, configure the wireless router (based on the actual network environment to configure)
(1) STA1 connected to the wireless router (the default is not encrypted.) Right-click the icon below the screen, select \
which shows a number of available wireless networks, double-click the TP-LINK wireless router connected, while on the connection is successful.
(2) Open the IE browser, enter the IP address: 192.168.1.1 ( wireless router default LAN IP address).
(3) wireless router management interface login (user name: admin, password: admin).
click interface on the left of the \
(4) Open the IE browser, enter the IP address: 192.168.1.8, log back in Wireless Router Management Interface (note that this was chosen for TP-LINK wireless router, other brands have similar products, such as CISCO and other configuration options), Click the interface on the left of the \
1) Select the \ \
(5) When the wireless router set up after the WEP key, STA1 need to re-connect to the wireless router (the key input key and a wireless router set the same), while on the connection is successful.
(6) Open IE browser, enter the IP address: 192.168.1.8, log wireless router management interface, click the interface on the left of the \ \
5, *** WEP, WPA key software download
[link widoczny dla zalogowanych]
2, experimental environment, system components
2.1 hardware environment
use WPA encryption with WEP and the wireless router or AP
with a Centrino laptop wireless card two (respectively defined as STA1 and STA2, wireless access as a legitimate user)
Ethereal
laptop wireless card a one (defined as STA3, as the intruder)
2.2 software environment
invaders STA3: WinAirCrackPack Kit,[link widoczny dla zalogowanych],
Note: STA3 To open the Control Panel - \
Our purpose of this experiment is to capture the appropriate data through the frame IV (initialization vector) Violence *** get WEP KEY, it only need to use airodump.exe (used to capture data frame) and WinAircrack.exe ( *** WEP KEY with) two programs on it
9,[link widoczny dla zalogowanych], *** the harm to the network after the key case of (fake AP)
Once the intruder knows the WEP or WPA wireless network key, you can connect to the local LAN, so intruders to enjoy As with normal access to the user access rights to the entire network, in-depth attack. Intruders can use IPBOOK, SuperScan tool like this and other LAN scanning the computer, the computer inside the files, directories, or entire hard drive can be copied or deleted, or even worse, other cases such as keyloggers, Trojan horses, spyware, program or other malicious programs, and so can be installed on your system, so the consequences are very serious.
(1) Introduction to WEP or WPA password when
been ***, the intruder may use the password and other wireless access point (AP) constructed a fake network, the signal strength when the camouflage of normal AP AP AP camouflage or user close to, the normal user will naturally leave access to the network, the user is in itself not feel the network to send and receive messages in the normal user, we can use similar tools such CAIN for POP3, telnet, etc., etc. *** password attacks.
(2) POP3 password ***
1) Open CAIN.
2) Click on the menu bar \
3) select a network adapter will be used for packet capture, click \
4) normal user starts the mail, the software can mail login name and password capture.
(3) the harm after being ***
when hackers your mailbox user name, password, POP3 server and SMTP server's IP address , you can directly access your mailbox, your e-mail information will be fully exposed to the hackers before.


Post został pochwalony 0 razy
Powrót do góry
Zobacz profil autora
Wyświetl posty z ostatnich:   
Napisz nowy temat   Odpowiedz do tematu    Forum Turniej Pokemon Strona Główna -> Arena Wody Wszystkie czasy w strefie EET (Europa)
Strona 1 z 1

 
Skocz do:  
Możesz pisać nowe tematy
Możesz odpowiadać w tematach
Nie możesz zmieniać swoich postów
Nie możesz usuwać swoich postów
Nie możesz głosować w ankietach


fora.pl - załóż własne forum dyskusyjne za darmo
Powered by phpBB © 2001, 2002 phpBB Group
Regulamin