PLA Forums
Other Stuff That Has Little To Do With PLA => Techinical Shit => Phreaking, Hacking, Social Engineering, Lock Picking => Topic started by: trevelyn on January 08, 2008, 05:32:56 PM
-
My own mediocre attempt at humor has been highly amusing to myself. hi. make some popcorn, and get sumn to drink. relax, and watch this movie:
http://blip.tv/file/587467
-
My own mediocre attempt at humor has been highly amusing to myself. hi. make some popcorn, and get sumn to drink. relax, and watch this movie:
http://blip.tv/file/587467
I've decided to give trevelyn a leet point everyday. Just because it he hasn't done some leet worthy on that day he'll surely make up for it with another post and then some. h3114 1337 h4ck0rz is y0u, trevelyn
-
Well done trevelyn,
Also, where'd you get the slick terminal interface? And that was a mouse pointer I saw right?
-
thankies ^_^
Well done trevelyn,
Also, where'd you get the slick terminal interface? And that was a mouse pointer I saw right?
that's just Gnome's terminal with a configured profile. The WiFu pick I made with the Gimp as a Wallpaper if you want a copy I can send you one. It's 1280x800 but I can change it easily. - trev.
-
O, thanks. I think I'll go configure my Gnome terminal now...
As for the wallpaper, I'm afraid I'll have to pass. If I replaced my current wallpaper I'd have nowhere to put my Hannah Montanna pictures.
-
:D i just got an email from someone asking me about a "green wifu" ?? and i responded back like "what?" and sent them a link to the wallpapers i have zipped for WNLAV1 on my site. He gets back to me with a link to Legend813's YouTube page and its THIS video!! what the hellll?? ?? heh
the funnier thing about this is that it got 90k VIEWS!!! how the hell did he do that?? he truly IS a legend
http://www.youtube.com/watch?v=hqeXaBEdOGg
<333
-
you rock. i'm just putting that out there. <3
-
Someone on that youtube video mentioned elcomsoft lhc. I had never heard of this before: http://www.net-security.org/secworld.php?id=5567
So apparently they get really high cracking speeds by using a video card processor instead of the cpu. That's crazy.
Screenshot of some guy using it:
http://www.freerainbowtables.com/phpBB3/viewtopic.php?f=6&t=41&start=60
-
I am going to start an MPI cluster project to crack aircrack cap files, it's very easy, but takes a long time.. The hardest part it seems is to successfully get a handshake. I know that you only need 2 parts now with the new aircrack and that cowpatty4.x supports WPA2, so when you finally do get it you can just walk away and crack away at the cap file as long as you want in hopes that they dont change there WPA. People from all over emailed me about the fall of TKIP recently and i already knew of that, it was already implemented into dev revs of aircrack-ng at the time, but seems like soon enough we will be able to crack wpa and wpa2 in the same amount of time as wep in i'd say about a year or so. :)
thanks rogueclown, you rock too, an i miss you.
-
Hey, check out this project.
http://mathema.tician.de/software/pycuda (http://mathema.tician.de/software/pycuda)
PyCuda lets you access Nvidia‘s CUDA parallel computation API from Python. Several wrappers of the CUDA API already exist–so what’s so special about PyCuda?
* Object cleanup tied to lifetime of objects. This idiom, often called RAII in C++, makes it much easier to write correct, leak- and crash-free code. PyCuda knows about dependencies, too, so (for example) it won’t detach from a context before all memory allocated in it is also freed.
* Convenience. Abstractions like pycuda.driver.SourceModule and pycuda.gpuarray.GPUArray make CUDA programming even more convenient than with Nvidia’s C-based runtime.
* Completeness. PyCuda puts the full power of CUDA’s driver API at your disposal, if you wish.
* Automatic Error Checking. All CUDA errors are automatically translated into Python exceptions.
* Speed. PyCuda’s base layer is written in C++, so all the niceties above are virtually free.
* Helpful Documentation.
Put your graphics card to work!
-
i miss you too, trev. <3 i've been so busy lately...i was out of town, and now that i'm back, i've been spending most of my free time working on organizing a hackerspace that we're planning here in chicago.
-
i miss you too, trev. <3 i've been so busy lately...i was out of town, and now that i'm back, i've been spending most of my free time working on organizing a hackerspace that we're planning here in chicago.
well, if by chance, you get a free second you'd like to spend with me either on aim or phone, i would still like you're help with using the GNU license! :)
-
Very well done :)
So the moral of the story is: use a big, confusing, non-dictionary password :p
-
yeah, seriously, but soon that won't be the issue.. so you will be able to just join networks with WPA2. it's coming, i can feel it.. we hack everything all the time.. i'm sure there are engineers and code mathemticians working together in some secret lab that will break it in no time. it'll be weak. Weak.
-
Oh Trevelyn you 1337 h4xx0r.
I'm not letting you near my network.
-
Why is it so freaking hard to do wireless security right? Why can't we just sign x.509 certs and be done with it?
Srsly, what am I missing here? Is it just the fact that it might have to share with other clients?
-
have you seen muts' new project yet? http://www.offensive-security.com/wpa-tables/
-
have you seen muts' new project yet? http://www.offensive-security.com/wpa-tables/
Do you know if he has the "49 Million WPA optimised password dictionary file" up were you can download it or the tables? Im just seeing tables.
-
Why is it so freaking hard to do wireless security right? Why can't we just sign x.509 certs and be done with it?
Srsly, what am I missing here? Is it just the fact that it might have to share with other clients?
Has any company ever managed to keep anything secure? DVDs were cracked, Bluray was cracked, HD DVD was cracked. People are constantly cracking Satellite TVs, Wiis and Xboxes and remotely hacking into every system imaginable. You'd think in 2009 (just 6 years until we'll have flying cars and free energy) that it wouldn't be so hard to keep everything locked down, but nothing has ever been secure. We're doing it wrong.
-
Why is it so freaking hard to do wireless security right? Why can't we just sign x.509 certs and be done with it?
Srsly, what am I missing here? Is it just the fact that it might have to share with other clients?
Has any company ever managed to keep anything secure? DVDs were cracked, Bluray was cracked, HD DVD was cracked. People are constantly cracking Satellite TVs, Wiis and Xboxes and remotely hacking into every system imaginable. You'd think in 2009 (just 6 years until we'll have flying cars and free energy) that it wouldn't be so hard to keep everything locked down, but nothing has ever been secure. We're doing it wrong.
Making things work doesn't make money.
-
1 second
YOU LIAR!!!
It took you
t>1.717878s
-
he told me at shmoo that he was seeding 50GB worth of tables for 150 of the most popular ESSID's.. not sure if thats what you mean or not, so far the one i got worked great, once again, in seconds.
-
It took four hours to break back into my hotspot on Friday (~20 packets/second). Someone added a password to my hotspot (WEP). I noticed you didn't have to use aireplay. Normally with aireplay-ng I can get 300 packets a second but I couldn't get an association attempt to stick. You have to generate a .xor stream with a chopchop attack (-4) then specify it as an argument (-y) to a replay attack (-3). This wouldn't work on my hotspot on Friday so it took four hours ,_,
-
what?
If you can't get an "authentication to stick" (if it says "Got a Deauthentication Packet!") or whatever, try aireplay-ng with the following arguments:
-1 6000 -o 1 -q 10
here is an example:
aireplay-ng -1 6000 -o 1 -q 10 -a 00:11:22:33:44:55 -h 00:11:22:33:44:55 <dev>
It will then send keep alive packets so you can open another window for the ARP injection.
-
Oh! I tried a couple of things like that, leaving it in the background while I tried to replay etc. I am talking about attack -1 yes