Categories
Technical
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
Share With Friends
Archive by Date
2012-08-06
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
Search Tag
aften
Maschinen
国际市场
Jillian
Abalone
Tarjuman
Penology
massenet
Delete
Bridenne
基地
差役
Energieausweis
Handelsrecht
Accountant
Exitus
Aimin
结构篇
Cantates
Detektei
Divanity
Romola
Sunrise
TOPICS
Wrist
Travis
Trois
WebSphere
times
科幻小说
Bernhoft
avatar
Spirito
ingo
Spark
melodies
Autoanitbody
deinem
Fanzine
Elleil
arizona
Fiasco
Militares
Jagerman
Sironi
Armide
BHAABHEEJIS
fluides
FITZROY
Nominees
Newest
Software Related Brian S. Madden, "Citrix MetaFrame XP: Advanced Technical Design Guide" (Repost)
Software Related Dreamweaver CS6: The Missing Manual
Software Related Ashley Shepherd, "Pro Tools for Video, Film, and Multimedia" (Repost)
Software Related Ken Bluttman, "Access Hacks: Tips & Tools for Wrangling Your Data" (Repost)
Software Related Aron Hsiao, "Sams Teach Yourself Red Hat Linux Fedora in 24 Hours"(Repost)
Software Related Israel Koren, C. Mani Krishna, «Fault-Tolerant Systems» (Repost)
Software Related Jeff Gamet, "Designer's Guide to Mac OS X Tiger" (Repost)
Software Related How to Cheat at Managing Microsoft Operations Manager 2005 [Repost]
Software Related The Finite Element Method: Linear Static and Dynamic Finite Element Analysis by Thomas J. R. Hughes (Repost)
Software Related Techniques of Semigroup Theory (Oxford Science Publications) by Peter M. Higgins (Repost)
Software Related Equations de Pfaff algebriques (Lecture notes in mathematics) by Jean-Pierre Jouanolou (Repost)
Software Related Curves and Surfaces in Computer Aided Geometric Design by Fujio Yamaguchi (Repost)
Software Related Introduction to Lie Algebras and Representation Theory (Graduate Texts in Mathematics) by J.E. Humphreys (Repost)
Software Related Mary Millhollon, "Microsoft Office 2003 Inside Out" (Repost)
Software Related *- Autonomous Categories (Lecture Notes in Mathematics) by M. Barr (Repost)
Software Related Simon St. Laurent, "Office 2003 XML" (Repost)
Software Related Blake Ross, «Firefox For Dummies» (Repost)
Software Related InDesign CS / CS2 Killer Tips
Software Related Microsoft® Office Excel® 2003 Step by Step [Repost]
Software Related Word 2003 In Pictures (Repost)
Software Related Dreamweaver CS6: The Missing Manual
Software Related Ashley Shepherd, "Pro Tools for Video, Film, and Multimedia" (Repost)
Software Related Ken Bluttman, "Access Hacks: Tips & Tools for Wrangling Your Data" (Repost)
Software Related Aron Hsiao, "Sams Teach Yourself Red Hat Linux Fedora in 24 Hours"(Repost)
Software Related Israel Koren, C. Mani Krishna, «Fault-Tolerant Systems» (Repost)
Software Related Jeff Gamet, "Designer's Guide to Mac OS X Tiger" (Repost)
Software Related How to Cheat at Managing Microsoft Operations Manager 2005 [Repost]
Software Related The Finite Element Method: Linear Static and Dynamic Finite Element Analysis by Thomas J. R. Hughes (Repost)
Software Related Techniques of Semigroup Theory (Oxford Science Publications) by Peter M. Higgins (Repost)
Software Related Equations de Pfaff algebriques (Lecture notes in mathematics) by Jean-Pierre Jouanolou (Repost)
Software Related Curves and Surfaces in Computer Aided Geometric Design by Fujio Yamaguchi (Repost)
Software Related Introduction to Lie Algebras and Representation Theory (Graduate Texts in Mathematics) by J.E. Humphreys (Repost)
Software Related Mary Millhollon, "Microsoft Office 2003 Inside Out" (Repost)
Software Related *- Autonomous Categories (Lecture Notes in Mathematics) by M. Barr (Repost)
Software Related Simon St. Laurent, "Office 2003 XML" (Repost)
Software Related Blake Ross, «Firefox For Dummies» (Repost)
Software Related InDesign CS / CS2 Killer Tips
Software Related Microsoft® Office Excel® 2003 Step by Step [Repost]
Software Related Word 2003 In Pictures (Repost)
Useful Links
Software Related Wireless Hacking Live - FBI version Full ISO | 635.24 MB
Posted on 2011-03-26
|
More Live Cd For Wireless Hacking, Also Used By The FBI This version is for all systems except systems with the Intel B/G wireless cards (IPW2200). - Live CD with all the tools you need to hack a WLAN / wireless Access point - Linux Live-CD - OS runs from CD - 635 mb - .iso - also used by the FBI. WEP Hacking - The Next Generation WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver. Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of ???strong??? encryption while a 128 bit key has 104. The IV is placed in encrypted frame???????s header, and is transmitted in plain text. Traditionally, crac*ing WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packetsa????a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP crac*ing program such as Aircrac* would be used to find the WEP key. Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, ???It doesn???????t matter if you use 128 bit WEP keys, you are vulnerable!??? WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver. Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of ???strong??? encryption while a 128 bit key has 104. The IV is placed in encrypted frame???????s header, and is transmitted in plain text. Traditionally, cracking WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packets a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key. Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. Basic Directions: 1)Boot from cd 2)get the wep key 3)write it down 4)reboot into windows 5)connect using wep key. Download
Rating:
2.5 out of 5 by Book123 |
Like this article?! Give us +1: