View Single Post
Staro 28.12.2007., 11:55   #22
klint.istvud
Premium
 
klint.istvud's Avatar
 
Datum registracije: Nov 2001
Lokacija: Zagreb
Postovi: 133
Citiraj:
Autor stuc Pregled postova
Uopće se ne šalim...

Evo riskiraću 7 dana hlađenja ili koliko već treba da bi neki tukci počeli razmišljati kako je sve moguće.

Evo malo o WPA, znači NE WEP

Breaking WPA

In order to be carry out the WPA dictionary attack using aircrack-ng we either have to:

1. Wait for a WPA client to associate to the network (This could take a while)
2.Force a WPA client off the network, forcing it to reassociate.

Either of these two method allows us to capture the WPA handshake, which is what we require to perform a dictionary attack.

The downside to using this Windows version of aircrack-ng is that there are not any freely available tools to perform this attack. So we have to either use a Linux tools (e.g. aireplay or void11) or wait for an association to occur.
Which ever way we gather the WPA handshake we still use the same tool; airodump.
Once we think we have captured the WPA handshake, we simply run the capture file through aircrack for confirmation:


pa kaže nadalje...

If have confirmed we have the WPA handshake (as above) we can attempt the dictionary attack:



As you can see above aircrack found the WPA PSK of "passphrase"

Toliko za sada o jednom ključu u početku i dinamičkim kasnije... ovo je još staro, ima toga još na kamare...

Nitko nije osporio da je moguce probiti WPA PSK zastitu, pogotovo u ovom slucaju di je kljuc jednostavna (unaprijed poznata) rijeci kao "passphrase".

ALI AKO KORISTIS DUGU RIJEC SA GOMILOM RANDOM ZNAKOVA NEMA SANSE DA CES U NEKOM REALNOM VREMENU SA KUCNIM RACUNALOM PROBITI ISTU.

Da li ti uopce znas sto je to "dictionary attack" i kako to funkcionira?
klint.istvud je offline   Reply With Quote