Skip to main content

Wireless Hacking Live (FBI Version)

This version is for all systems except systems with the Intel B/G wireless cards (IPW2200).
- Live CD with all the tools you need to hack a WLAN / wireless Access point – Linux Live-CD – OS runs from CD – 635 MB ISO
- Also used by the FBI

WEP Hacking – The Next Generation

WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.

Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of strong encryption while a 128 bit key has 104. The IV is placed in encrypted frames header, and is transmitted in plain text.

Traditionally, cracking WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packets—a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key.

Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, It does’nt matter if you use 128 bit WEP keys, you are vulnerable!

WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products.

WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.

Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long.

A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of strong encryption while a 128 bit key has 104.

The IV is placed in encrypted frames header, and is transmitted in plain text.

Traditionally, cracking WEP keys has been a slow and boring process.

An attacker would have to capture hundreds of thousands or millions of packets a process that could take hours or even days, depending on the volume of traffic passing over the wireless network.

After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key.

Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared.

This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours.

How to use?

1) Boot from cd
2) Get the wep key
3) Write it down
4) Reboot into windows
5) Connect using wep key.

Rapidshare

http://rapidshare.com/files/360410440/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part1.rar

http://rapidshare.com/files/360411703/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part2.rar

http://rapidshare.com/files/360411809/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part3.rar

http://rapidshare.com/files/360410658/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part4.rar

http://rapidshare.com/files/360410428/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part5.rar

http://rapidshare.com/files/360411962/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part6.rar

http://rapidshare.com/files/360410415/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part7.rar

Hotfile

http://hotfile.com/dl/31696201/7826a9e/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part1.rar.html

http://hotfile.com/dl/31696217/b3b507b/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part2.rar.html

http://hotfile.com/dl/31696268/906d5fa/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part3.rar.html

http://hotfile.com/dl/31696262/a256a5a/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part4.rar.html

http://hotfile.com/dl/31696246/f683693/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part5.rar.html

http://hotfile.com/dl/31696253/e620749/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part6.rar.html

http://hotfile.com/dl/31696237/b3a9b9f/gacon.ac_live.cd-wireless.hacking.FBI.using.SM.part7.rar.html


Comments

Popular posts from this blog

ESP32-C6 Wi-Fi Logger with Browser GPS + Heat Map Dashboard

This project is an ESP-IDF firmware for the Seeed Studio XIAO ESP32-C6 that turns the board into a self-hosted, secure Wi-Fi scanning logger. It creates its own access point, serves a responsive HTTPS web UI, logs nearby Wi-Fi access points, optionally tags rows with GPS coordinates (provided by the client browser), and exposes battery status from the on-board LiPo input. The end result is a pocket Wi-Fi “survey” tool: scan, track, export logs as CSV, and generate a heat map view to visualize RSSI vs location. Project overview and feature set: :contentReference[oaicite:1]{index=1} What it does AP + Station mode so the device can serve the dashboard while scanning nearby Wi-Fi networks. HTTPS web interface using a bundled certificate/key for local secure access. Single scan and continuous tracking modes. CSV export for analysis and archiving. Persistent logging to SPIFFS at /spiffs/logs.csv . Battery monitoring via ADC with voltage/percentage/status sh...

סלקום ממש לא כדאי לקנות מאצלכם מודים

סלקום באמת מבאס לגלוש אתכם !! בשעה טובה ומצלחת קניתי מודם סלולארי על מנת שאוכל לגלוש באינטרנט בעזרתו. בעמדת המכירה הציעו לי את מסלול תשלום מראש הידוע כtalkman, מסלול זה התאים לצרכי כך שאוכל לדעת מראש כמה אשלם ובחרתי לבצע את העיסקה. כאשר התחלתי לגלוש לשרתים המספקים תוכן כגון rapidshare , megaupload , zshare ועוד גיליתי כי כתובת הIP ממנה אני גולש חסומה, או עברה את כמות השימוש המותרת אולם זה קורה לפני שאני ביצעתי שימוש כלשהוא. ניסיתי להשתמש בכתובות אחרות באמצעות קבלת כתובת IP אחרת (הוצאה והכנסה של המכשיר נותנת כתובת חדשה), אולם בכל ניסיון הכתובות היו חסומות, כלומר לא יכלתי להשתמש כלל בשירות. נתון זה שהכתבות כבר בשימוש ומי שמתמש בכתובת דינאמיות חסום לא נאמר לי ולא הועלה בעת המכירה. מה שקורה שבכל אתר שאני רוצה להשתמש בו אני חסום ולא יכול להשתמש. דברתי עם מספר חברים שיש להם מודמים כאלה כבר זמן רב , כששאלתי איך לפתור : אמרו כי הבעייה נפתרה לנו ע"י שינוי בתוך המודם ל: ABN = intereal ו זה בשפה המקצועית אומר " IP קבוע" שמחתי ל פתרון ו נגשתי ל סלקום אחרי 30 דקות המתנה...

USB Hidden Copier

This sneaky little program will copy any USB drive content to your hard drive without detection of the USB owner. 1. It is totally invisible and masked enough in order not to be detected easily. 2. It will copy a maximum of 8GB that is enough space and information will not fit all hard drive space if you can not monitor it for a long time. 3. Content is saved in a folder named as the copied Usb Drive name so you can find easily who is the owner of usb copied. 4. It starts at startup of computer. 5. First copy is made 3 minutes after computer starts and then every 10 minutes the content will be overwritten, so you will have always lasted content of that USB. 6. With it’s Control Panel you can easily manage it. 7. Content copied is saved by default in: “C:\ WINDOWS \sysbackup\” 8. The copier program is called “systemidle. exe ” in order to mask it. 9. In order not to copy you own USB Drive you can create a file named “friendflag.winxp” and put it directly on your usb (this fil...