Turniej Pokemon
FAQ
Szukaj
Użytkownicy
Grupy
Galerie
Rejestracja
Profil
Zaloguj się, by sprawdzić wiadomości
Zaloguj
Forum Turniej Pokemon Strona Główna
->
Rio
Napisz odpowiedź
Użytkownik
Temat
Treść wiadomości
Emotikony
Więcej Ikon
Kolor:
Domyślny
Ciemnoczerwony
Czerwony
Pomarańćzowy
Brązowy
Żółty
Zielony
Oliwkowy
Błękitny
Niebieski
Ciemnoniebieski
Purpurowy
Fioletowy
Biały
Czarny
Rozmiar:
Minimalny
Mały
Normalny
Duży
Ogromny
Zamknij Tagi
Opcje
HTML:
NIE
BBCode
:
TAK
Uśmieszki:
TAK
Wyłącz BBCode w tym poście
Wyłącz Uśmieszki w tym poście
Kod potwierdzający: *
Wszystkie czasy w strefie EET (Europa)
Skocz do:
Wybierz forum
Zarząd
----------------
Regulamin
Ogłoszenia
Trenerzy
----------------
Rio
Piter
Aja
Hao
Rużyk
Turniej
----------------
Zgłoszenia
Areny
----------------
Arena Wody
Arena Ziemii
Arena Powietrza
Arena Ognia
Arena Elektryczności
Arena Trucizny
Arena Rośliny
Arena Normal
Przegląd tematu
Autor
Wiadomość
csdgtwrrt
Wysłany: Śro 5:17, 17 Lis 2010
Temat postu: # # # Wireless network WEP WPA key
Our purpose of this experiment is to capture the appropriate data through the frame IV (initialization vector) Violence *** get WEP KEY, it only need to use airodump.exe (used to capture data frame) and WinAircrack.exe ( *** WEP KEY with) two programs on it
9, *** the harm to the network after the key case of (fake AP)
Once the intruder knows the WEP or WPA wireless network key, you can connect to the local LAN, so intruders to enjoy As with normal access to the user access rights to the entire network, in-depth attack. Intruders can use IPBOOK, SuperScan tool like this and other LAN scanning the computer, the computer inside the files, directories, or entire hard drive can be copied or deleted, or even worse, other cases such as keyloggers, Trojan horses, spyware, program or other malicious programs, and so can be installed on your system, so the consequences are very serious.
(1) Introduction to WEP or WPA password when
been ***, the intruder may use the password and other wireless access point (AP) constructed a fake network, the signal strength when the camouflage of normal AP AP AP camouflage or user close to, the normal user will naturally leave access to the network, the user is in itself not feel the network to send and receive messages in the normal user, we can use similar tools such CAIN for POP3, telnet, etc., etc. *** password attacks.
(2) POP3 password ***
1) Open CAIN.
2) Click on the menu bar \
3) select a network adapter will be used for packet capture, click \
4) normal user starts the mail, the software can mail login name and password capture.
(3) the harm after being ***
when hackers your mailbox user name, password, POP3 server and SMTP server's IP address , you can directly access your mailbox, your e-mail information will be fully exposed to the hackers before.
1,
ugg replacement insole
, *** About
WinAirCrackPack software kit is a wireless LAN scanning and key *** tools, including tools such as airodump and aircrack. It can monitor the wireless network to transmit data,
GHD pink ceramic stylers
, data collection package, and calculate the WEP / WPA key.
From the Red Hacker Alliance
(www.7747.net) Original:
http://www.7747.net/Article/200811/30458.html
sniffing tools based on 802.11, with *** wep key functions
6, wireless network card installed Ethereal
Note: Wireless network card driver for packet capture with Atheros v4.2.1, the card must be used Atheros AR5001, AR5002, AR5004, AR5005 or AR5006 chipsets, network cards under the table can be used, this study, we used the 108M wireless card Netgear (Model: WG511T).
(1) get caught in the STA3 laptop wireless card driver is installed. Insert the wireless network card, the pop-up window shown in Figure 11. Select \
(2) Select \
(3) Select \
(4) Click \ Click \
7, *** WEP key
(1) to STA1 and STA2 reconnect to the wireless router.
(2) notebook computer running at STA3 airodump, the tool used to capture packets, follow the prompts to select \,
# # # Wireless network WEP WPA key
, where the choice atheros
chi
p;
\ any);
\
(3) Enter, enter the following interface.
(4) when the AP is extremely frequent communication data traffic (for example, STA1 and STA2 can Duikao file to generate data traffic), \ When caught about 30 million (104-bit RC4 encryption, such as required use of catches 100 million package) \
(5) Click the left side of the \
(6) Click the left side of the \
( 7) After all the settings, click the bottom right corner of the \
(
to select *** network BSSID (In this study, select \
3, experimental topology
slightly.
8, *** WPA key
(1) modify the wireless router's encryption type and encryption method, and is set to WPA-PSK authentication and TKIP encryption.
(2) runs in laptop STA3 airodump, the tool used to capture packets, follow the prompts to select \ n \
(3) Enter, enter the following interface
(4) reconnect to the wireless router STA1, airodump will capture a wireless router and STA1 four- way handshake process.
(5) Start WinAircrack.
(6) Click the left side of the \
(7) Click the left side of the \
(
After all the settings, click the bottom right corner of the \
(9) to select *** network BSSID (this experiment select \
4, configure the wireless router (based on the actual network environment to configure)
(1) STA1 connected to the wireless router (the default is not encrypted.) Right-click the icon below the screen, select \
which shows a number of available wireless networks, double-click the TP-LINK wireless router connected, while on the connection is successful.
(2) Open the IE browser, enter the IP address: 192.168.1.1 ( wireless router default LAN IP address).
(3) wireless router management interface login (user name: admin, password: admin).
click interface on the left of the \
(4) Open the IE browser, enter the IP address: 192.168.1.8, log back in Wireless Router Management Interface (note that this was chosen for TP-LINK wireless router, other brands have similar products, such as CISCO and other configuration options), Click the interface on the left of the \
1) Select the \ \
(5) When the wireless router set up after the WEP key, STA1 need to re-connect to the wireless router (the key input key and a wireless router set the same), while on the connection is successful.
(6) Open IE browser, enter the IP address: 192.168.1.8, log wireless router management interface, click the interface on the left of the \ \
5, *** WEP, WPA key software download
http://www.xdowns.com/soft/1/66/2007/Soft_39170.html
2, experimental environment, system components
2.1 hardware environment
use WPA encryption with WEP and the wireless router or AP
with a Centrino laptop wireless card two (respectively defined as STA1 and STA2, wireless access as a legitimate user)
Ethereal
laptop wireless card a one (defined as STA3,
ugg 5866 boots
, as the intruder)
2.2 software environment
invaders STA3: WinAirCrackPack Kit,
Note: STA3 To open the Control Panel - \
aircrack.exe WIN32 version of the original aircrack program
airdecap.exe WEP / WPA data frame decoding process
airodump.exe capture process
Updater.exe WIN32 version of aircrack The upgrade version of aircrack
WinAircrack.exe WIN32 graphical front-end
wzcook.exe local wireless network card cache WEPKEY logger
fora.pl
- załóż własne forum dyskusyjne za darmo
Powered by
phpBB
© 2001, 2002 phpBB Group
Regulamin