Menu

Main Menu
Talk Get Daily Search

Member's Online

    User Name
    Password

    can n900 crack WPA using Tkiptun-ng ?

    Reply
    Page 2 of 2 | Prev |   1   2 |
    fatcobrah | # 11 | 2011-01-31, 21:26 | Report

    Originally Posted by Mentalist Traceur View Post
    Lol - I was considering doing that, but looks like you beat me to it. My plan actually was to eventually request maintainer status for the now-never-updated-in-repo Aircrack-NG suite.

    But I need to have the spare time to figure out how to make autobuilder work, and all the other mandatory stuff.

    P.S. If you can't figure out compiling, it is probably not a good idea to try to fiddle with tkiptun-ng. I mean, the very aircrack-ng wiki says that.
    bro i dont
    about fiddle with tkiptun-ng i think it worth )

    Edit | Forward | Quote | Quick Reply | Thanks

     
    fatcobrah | # 12 | 2011-01-31, 21:30 | Report

    Originally Posted by hawaii View Post
    oh heyyyy, what's up guyth?

    tkiptun-ng can inject valid packets into a stream. It's not meant to "crack WPA" at all. It's a complete PoC for communication on a WPA-TKIP protected network, but not actually authenticating before hand.

    Having said that, you don't need a new driver. wl1251-bleeding-edge already supports live frame injection without association. Any tools you find that require RFMON will work perfectly fine. The simple fact that you want a new driver to "support" this indicates you need to do more research on the subject. Good day sir.
    hmmm u mean that we cant crack wpa using this tool?
    wt about this
    http://airodump.net/wpa-security-broken-pacsec/

    Edit | Forward | Quote | Quick Reply | Thanks

    Last edited by fatcobrah; 2011-01-31 at 21:49.

     
    Mentalist Traceur | # 13 | 2011-01-31, 21:37 | Report

    If you can't look up the version numbers to get the change log, why on earth are you asking for tkiptun-ng? Bah, IDK, I'm being more dickish today than is right methinks.

    Honestly, I don't know the changelog. But if you care about the details, then look at the version string of the Aircrack-NG in the repos, and the Aircrack-NG Creamy Goodness compiled.

    If nothing else, this will be guaranteed (most likely) to have A: More binaries/commands - such at the tkiptun-ng that you wanted - maybe a couple of other ones that weren't included in the repository one, depending on how Creamy Goodness compiled it.

    Two, it won't have the retarted iw conflict, so you can apt-get install iw, and airmon-ng will work properly, unlike the way it does now.

    Edit | Forward | Quote | Quick Reply | Thanks
    The Following User Says Thank You to Mentalist Traceur For This Useful Post:
    fatcobrah

     
    fatcobrah | # 14 | 2011-01-31, 21:37 | Report

    Originally Posted by Mentalist Traceur View Post
    I think he wasn't sure if this driver worked with this specifically, because of what's said on this wiki page: http://www.aircrack-ng.org/doku.php?id=tkiptun-ng

    Namely about how only a few drivers have been tested with this, and one is known to completely fail. I presume they logically supposed that it's possible that there's some specific function of live frame injection that some drivers could/couldn't do, even when they could do live frame injection in general. I mean, bugs like that do happen, maybe not in this exact field, but in general so that people with mid-level technical know-how on the subject aren't sure whether or not that's possible.

    That said, I agree with you on the do-more-research bit, albeit for the above stated reasons in my earlier posts, not just because of what you pointed out.
    doing research about this tool ? icant find information about this tool or any proved example :S & as i told u before i am not a programmer and i find it as a good idea to make it happen
    sry abt my english :$ hehe
    btw wt about the professional users like mohammadAG ,...etc ?

    Edit | Forward | Quote | Quick Reply | Thanks

     
    fatcobrah | # 15 | 2011-01-31, 21:51 | Report

    security research from Mark Tew as a next (not brute force), new implementation of the WPA-TKIP attack. WPA-TKIP security based on the dynamic key generation was supposed to be by laicks and professionals as unbreakable. Much more safe then funny WEP encription.

    According to the references Mark Tew and Martin Beck will present a way how to pass TKIP (Temporal Key Integrity Protocol), that is know as the one that uses a dynamic key generation for each of data block. The time needed for successful WPA cracking is 12 to 15 minutes. So don’t forget to check fresh materials from the PACSEC 2008 conference. The details will be published also here at Remote Security.

    Edit | Forward | Quote | Quick Reply | Thanks

     
    Creamy Goodness | # 16 | 2011-01-31, 21:58 | Report

    the one i posted is updating 1.0 from the repos to 1.1 from the aircrack-ng site. I honestly don't know the changes, but it properly puts the card into monitor mode, or at least appears to do so. I didn't test it much, so I can't really say. I put a dependancy on iw, app manger is a pile of sh1t so it won't fetch iw for you, figure out how to apt-get iw first...

    I don't know what you are quoting about the tool, honestly it IS hard to understand from the aircrack-ng article, go read the one on ars-technica and you will see all it does it allows some packets to be inserted to the network, nothing to do with key-recovery.

    http://arstechnica.com/security/news...pa-cracked.ars

    just read the last section, stuff like this is simpler to understand i hope:
    Originally Posted by
    To describe the attack succinctly, it's a method of decrypting and arbitrarily and successfully re-encrypting and re-injecting short packets on networks that have devices using TKIP. That's a very critical distinction; this is a serious attack, and the first real flaw in TKIP that's been found and exploited. But it's still a subset of a true key crack.

    Edit | Forward | Quote | Quick Reply | Thanks

    Last edited by Creamy Goodness; 2011-01-31 at 22:02.

     
    fatcobrah | # 17 | 2011-01-31, 22:07 | Report

    i'v installed iw
    Please remember this is an extremely advanced attack. You must possess advanced linux and aircrack-ng skills to use this tool. DO NOT EXPECT support unless you can demonstrate you have these skills. -->i am not !!! :'(
    and i think it's a tool to crack wpa and crack = password :PPP

    Edit | Forward | Quote | Quick Reply | Thanks

     
    Mentalist Traceur | # 18 | 2011-01-31, 22:15 | Report

    As has been explain by Hawaii, it doesn't crack the password. It allows you to send at most 7 packets/frames. 7. If you watch packet counts, an internet connection to a website typically fetches a couple hundred packets a second.

    This is not a password cracking tool. This a really low-level, really knowledge-requiring, hacking tool for very specific attacks.

    Edit | Forward | Quote | Quick Reply | Thanks

     
    fatcobrah | # 19 | 2011-01-31, 22:19 | Report

    Originally Posted by Mentalist Traceur View Post
    As has been explain by Hawaii, it doesn't crack the password. It allows you to send at most 7 packets/frames. 7. If you watch packet counts, an internet connection to a website typically fetches a couple hundred packets a second.

    This is not a password cracking tool. This a really low-level, really knowledge-requiring, hacking tool for very specific attacks.
    :'(((((((((((((((((((((((((((((((
    i think so :'(
    there always a hope ryt ?D u'll never know if they can use this tool in future or not ,maybe oneday u'll find it easier than WEP cracking DD
    thx

    Edit | Forward | Quote | Quick Reply | Thanks

     
    Creamy Goodness | # 20 | 2011-01-31, 22:40 | Report

    well, there's not much hope. that tool was released back in 2008, and it doesn't work in wpa-aes and is probably one of the reasons we all use wpa2 now!
    it's still cool though, just not very useful...

    Edit | Forward | Quote | Quick Reply | Thanks

     
    Page 2 of 2 | Prev |   1   2 |
vBulletin® Version 3.8.8
Normal Logout