Menu

Main Menu
Talk Get Daily Search

Member's Online

    User Name
    Password

    N900 WEP cracking / Backtrack 3

    Reply
    Page 2 of 8 | Prev |   1   2   3     4   | Next | Last
    phreck | # 11 | 2009-12-13, 23:48 | Report

    bahahahaha.

    Edit | Forward | Quote | Quick Reply | Thanks
    The Following User Says Thank You to phreck For This Useful Post:

     
    jaem | # 12 | 2009-12-14, 00:45 | Report

    Originally Posted by Hogwash View Post
    Gee "1337", I wonder why you're asking these questions? Doesn't sound like you're particularly "1337" at all.
    Well, when geeks casually refer to things like "The Internets" or other silly terms/conventions in common conversation, it's generally understood that we're implictly mocking those who actually talk that way, and not meaning it seriously. Given that this is a text-only medium, and a new user, let's not be too judgemental

    To go back to the OP, Backtrack is a highly customized LiveCD, and not a general-purpose distro, so while some tools may work on the N900, you can't "run backtrack" on it in any normal sense.
    As to the response from Nokia, I'm hardly surprised. The thing about counter-/security is that you're expected to figure things out yourself for the most part. Whatever shade their hat is, most are fairly professional about what they do. As such, academic/technical discussion and learning is encouraged, but questions like "how do I setup wifi cracking" tend to get dismissed on principle (even if you weren't being a noob). The assumption is that if you're seriously interested in security (and not just trying to compromise your neighbour's network to be a jerk), then you'll invest time and work into learning the art of security properly, and not expect a quick tutorial on how to do things of potentially dubious legality. I'm not accusing you of this personally, but trying to explain how such questions usually come across.

    Edit | Forward | Quote | Quick Reply | Thanks
    The Following 2 Users Say Thank You to For This Useful Post:
    Arkenklo, Venty

     
    jiiv | # 13 | 2009-12-14, 01:05 | Report

    Originally Posted by jaem View Post
    Well, when geeks casually refer to things like "The Internets" or other silly terms/conventions in common conversation, it's generally understood that we're implictly mocking those who actually talk that way, and not meaning it seriously.
    I prefer "Blogotubes" myself.
    That said, it's safe to assume that RE is not going to port the entire BT distro to the n900, but most of the utilities should cross compile OK.
    If I remember correctly, one of the RE guys had been working with one of the older NITs a while back, so they're at least somewhat familiar with the devices. Perhaps their forum would be the best place to enquire? The remote-exploit team has been quite cooperative in my experience.

    Edit | Forward | Quote | Quick Reply | Thanks

     
    switchfiend | # 14 | 2009-12-14, 01:10 | Report

    Don't know about Backtrack (I don't imagine they're going to want to go through and rebuild everything for ARM sources), but you might want to check out the next version of NeoPwn.

    The previous version ran on Openmoko, and they announced that the new version is for the N900. I suspect odds are good that they'll get packet injection working.

    You can follow it here: http://www.neopwn.com/hardware.php

    Edit | Forward | Quote | Quick Reply | Thanks
    The Following 4 Users Say Thank You to switchfiend For This Useful Post:
    jiiv, Pretoriano, real_per, Venty

     
    real_per | # 15 | 2009-12-14, 01:36 | Report

    I want my Spoonwep2 and Spoonwpa on my N900. I'll be a mobile cracking powerhouse!

    Edit | Forward | Quote | Quick Reply | Thanks

     
    phreck | # 16 | 2009-12-14, 02:12 | Report

    its only a matter of time before we see tools like MSF and Aircrack-ng ported to fremantle. lucky for us, most of the pen testing apps are ran from within console, so porting should be fairly easy, unless there is an issue with the arm arch. i say either be patient, or get the sdk and see what you can do to speed things along. thats just me though.

    Edit | Forward | Quote | Quick Reply | Thanks

     
    Venomrush | # 17 | 2009-12-14, 02:33 | Report

    Why can't you all just try it out and you'll see it'll support or not

    Edit | Forward | Quote | Quick Reply | Thanks

     
    terminal3 | # 18 | 2009-12-14, 14:56 | Report

    Originally Posted by phreck View Post
    its only a matter of time before we see tools like MSF and Aircrack-ng ported to fremantle. lucky for us, most of the pen testing apps are ran from within console, so porting should be fairly easy, unless there is an issue with the arm arch. i say either be patient, or get the sdk and see what you can do to speed things along. thats just me though.
    There's no need to port MSF, since it runs on ruby, with a few additions (mainly rubygems). There's already ruby and irb ports in the extras-devel repository, and I can confirm that MSF works quite well, so far

    Edit | Forward | Quote | Quick Reply | Thanks
    Attached Images
     

     
    greyw0lf | # 19 | 2009-12-14, 17:33 | Report

    so where can i actually download msf?? seems like an interesting software to test out

    Edit | Forward | Quote | Quick Reply | Thanks

     
    Ph0b | # 20 | 2009-12-14, 17:45 | Report

    I've installed aircrack-ng from debian arm repos without any issues.
    After that, airodump works but seems to see everything on channel 6.
    aicrack-ng --test try to inject packets but it's not successful.

    Edit | Forward | Quote | Quick Reply | Thanks

     
    Page 2 of 8 | Prev |   1   2   3     4   | Next | Last
vBulletin® Version 3.8.8
Normal Logout