![]() |
Re: can n900 crack WPA using Tkiptun-ng ?
Quote:
about fiddle with tkiptun-ng i think it worth :)) |
Re: can n900 crack WPA using Tkiptun-ng ?
Quote:
wt about this http://airodump.net/wpa-security-broken-pacsec/ |
Re: can n900 crack WPA using Tkiptun-ng ?
Honestly, I don't know the changelog. But if you care about the details, then look at the version string of the Aircrack-NG in the repos, and the Aircrack-NG Creamy Goodness compiled. If nothing else, this will be guaranteed (most likely) to have A: More binaries/commands - such at the tkiptun-ng that you wanted - maybe a couple of other ones that weren't included in the repository one, depending on how Creamy Goodness compiled it. Two, it won't have the retarted iw conflict, so you can apt-get install iw, and airmon-ng will work properly, unlike the way it does now. |
Re: can n900 crack WPA using Tkiptun-ng ?
Quote:
sry abt my english :$ hehe btw wt about the professional users like mohammadAG ,...etc ? |
Re: can n900 crack WPA using Tkiptun-ng ?
security research from Mark Tew as a next (not brute force), new implementation of the WPA-TKIP attack. WPA-TKIP security based on the dynamic key generation was supposed to be by laicks and professionals as unbreakable. Much more safe then funny WEP encription.
According to the references Mark Tew and Martin Beck will present a way how to pass TKIP (Temporal Key Integrity Protocol), that is know as the one that uses a dynamic key generation for each of data block. The time needed for successful WPA cracking is 12 to 15 minutes. So don’t forget to check fresh materials from the PACSEC 2008 conference. The details will be published also here at Remote Security. |
Re: can n900 crack WPA using Tkiptun-ng ?
the one i posted is updating 1.0 from the repos to 1.1 from the aircrack-ng site. I honestly don't know the changes, but it properly puts the card into monitor mode, or at least appears to do so. I didn't test it much, so I can't really say. I put a dependancy on iw, app manger is a pile of sh1t so it won't fetch iw for you, figure out how to apt-get iw first...
I don't know what you are quoting about the tool, honestly it IS hard to understand from the aircrack-ng article, go read the one on ars-technica and you will see all it does it allows some packets to be inserted to the network, nothing to do with key-recovery. http://arstechnica.com/security/news...pa-cracked.ars just read the last section, stuff like this is simpler to understand i hope: Quote:
|
Re: can n900 crack WPA using Tkiptun-ng ?
i'v installed iw :)
Please remember this is an extremely advanced attack. You must possess advanced linux and aircrack-ng skills to use this tool. DO NOT EXPECT support unless you can demonstrate you have these skills. -->i am not !!! :'( and i think it's a tool to crack wpa and crack = password :PPP |
Re: can n900 crack WPA using Tkiptun-ng ?
As has been explain by Hawaii, it doesn't crack the password. It allows you to send at most 7 packets/frames. 7. If you watch packet counts, an internet connection to a website typically fetches a couple hundred packets a second.
This is not a password cracking tool. This a really low-level, really knowledge-requiring, hacking tool for very specific attacks. |
Re: can n900 crack WPA using Tkiptun-ng ?
Quote:
i think so :'( there always a hope ryt ?:DD u'll never know if they can use this tool in future or not :D ,maybe oneday u'll find it easier than WEP cracking :DDD thx |
Re: can n900 crack WPA using Tkiptun-ng ?
well, there's not much hope. that tool was released back in 2008, and it doesn't work in wpa-aes and is probably one of the reasons we all use wpa2 now!
it's still cool though, just not very useful... |
| All times are GMT. The time now is 01:01. |
vBulletin® Version 3.8.8