Sunday, April 25, 2010

Wireless Hacking Live (FBI Version)

This version is for all systems except systems with the Intel B/G wireless cards (IPW2200).
- Live CD with all the tools you need to hack a WLAN / wireless Access point – Linux Live-CD – OS runs from CD – 635 MB ISO
- Also used by the FBI

WEP Hacking – The Next Generation

WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.

Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of strong encryption while a 128 bit key has 104. The IV is placed in encrypted frames header, and is transmitted in plain text.

Traditionally, cracking WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packets—a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key.

Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, It does’nt matter if you use 128 bit WEP keys, you are vulnerable!

WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products.

WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.

Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long.

A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of strong encryption while a 128 bit key has 104.

The IV is placed in encrypted frames header, and is transmitted in plain text.

Traditionally, cracking WEP keys has been a slow and boring process.

An attacker would have to capture hundreds of thousands or millions of packets a process that could take hours or even days, depending on the volume of traffic passing over the wireless network.

After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key.

Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared.

This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours.

How to use?

1) Boot from cd
2) Get the wep key
3) Write it down
4) Reboot into windows
5) Connect using wep key.

Rapidshare

http://rapidshare.com/files/360410440/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part1.rar

http://rapidshare.com/files/360411703/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part2.rar

http://rapidshare.com/files/360411809/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part3.rar

http://rapidshare.com/files/360410658/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part4.rar

http://rapidshare.com/files/360410428/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part5.rar

http://rapidshare.com/files/360411962/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part6.rar

http://rapidshare.com/files/360410415/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part7.rar

Hotfile

http://hotfile.com/dl/31696201/7826a9e/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part1.rar.html

http://hotfile.com/dl/31696217/b3b507b/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part2.rar.html

http://hotfile.com/dl/31696268/906d5fa/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part3.rar.html

http://hotfile.com/dl/31696262/a256a5a/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part4.rar.html

http://hotfile.com/dl/31696246/f683693/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part5.rar.html

http://hotfile.com/dl/31696253/e620749/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part6.rar.html

http://hotfile.com/dl/31696237/b3a9b9f/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part7.rar.html


Deep Learning Training Exercises Enhance Your Memory and Concentration

Improve memory & concentration Absorb, retain, and recall information. Expand awareness and increase creativity Do you ever wonder why as children we learn more in our first few years of life? The answer lies in the mysterious and elusive Theta brain wave state. Up until the age of six, children are predominantly in Theta. This frequency allows the brain to absorb and retain massive amounts of information that gets stored in long-term memory. You can restore this magical ability through daily Theta brain wave training. When you need to study and assimilate new information, slip on your headphones, relax and listen to Deep Learning. Within minutes, memory receptors are gently stimulated as precision-engineered frequencies shift your brain into perfect balance.

In this state of heightened receptivity, the clarity and speed with which you can concentrate, study, and integrate and store information is profoundly improved. Theta brain waves are associated with long-term-potentiation. Use Deep Learning For: Super learning Receiving inner direction and insights Self-hypnosis Behavior modification Improving Memory Instructions for listening: Listen to this program daily for either thirty or sixty minutes a day to train your brain to develop more Theta activity. Regular use will enhance overall mental performance. Here are three ways to use Deep Learning. Experiment to explore which way works best for you and your needs. 1. Thirty minutes before studying, lie down, close your eyes and listen to Deep Learning. This will prepare your brain for absorbing new information. 2. Or, listen to Deep Learning while you study. 3. Listen to Deep Learning to relax, unwind or meditate. After regular use you ll notice a dramatic increase in your ability to retain and retrieve information. What You Can Expect: Increased creativity Improved memory Enhanced ability to focus and concentrate Greater clarity of thought Expanded awareness.

Monday, April 5, 2010

ICANN



We will be on a date this weekend with the largest a dramatic change in the Internet 40 years ago, where it is supposed to adopt the ICANN ICANN (Internet Corporation for Assigned Names and Numbers) Draft write URLs in languages other than English.
ICANN will work this week's meeting in Seoul to decide whether to permit typing URLs in languages other than English, and if the adoption of this change will be the biggest change since the invention of the Internet 40 years ago, says director Peter Dinecat next meeting of ICANN

Friday, April 2, 2010

Why you need to share less on Facebook and Twitter

It seems counterintuitive, this concept of sharing less while using tools that encourage you to share more. Unless you are an expert when it comes to understanding privacy settings, social network platforms may be giving employers, law enforcement and strangers access to your updates.

Facebook is perhaps the most dangerous platform when it comes to sharing information. With its multitude of privacy, search and profile settings, Facebook can be confusing for average users who want to protect themselves. Unless you've created segmented Friends lists, your site activity will be announced for all to see.

You might get weird looks from your co-workers if you join the popular "Awkward moments define my life" Group to be ironic. Your mother might lecture you if you become a Fan of fictional womanizer Barney Stinson. Or you might lose your health benefits because you posted pictures of yourself having fun when you were on sick leave for depression (true story).

Not to mention the implications once you throw law enforcement officials and burglars into the mix. A sarcastic tweet about hating politicians could land you in jail. And those harmless Foursquare check-ins you use to get discounts and assert your mayorship at the local coffee shop? They're also letting strangers know that you're not home at the moment.

With nearly every one of your social network activities displayed publicly, it takes some restraint to avoid overexposing your personal life. Learn about each of your network's privacy settings and use them well to protect yourself from unwanted eyeballs.