Jump to content

barry99705

Dedicated Members
  • Posts

    3,109
  • Joined

  • Last visited

  • Days Won

    104

Everything posted by barry99705

  1. Well yea! I've run kismet with 4 wifi cards at once. Had them all channel hopping only three channels, so 1 card would be doing channels 1, 4, 7, then next would be doing 2, 5, 8, next would be doing 3, 6, 9, last would be doing 10, 6, 11. Going down the highway at 65+mph and you could miss an access point with just one card.
  2. How are you connecting to each other? By hostname or ip? If hostname isn't working use ip. DNS probably isn't being pushed over the tunnel.
  3. Linux handles movies better on non-Mac hardware then OSX. I've not found a movie on the internet I can't play on my Macs.
  4. Neat! I might borrow your time from the gps script for my wrt. That's the one thing I could never get to work right when I built my wardriving wrt54gs box. Got the serial working, got the mmc card working, even got kismet working. I could log in and manually set the time, and sometimes it'd get the time from the gps. A bunch of us over at the netstumbler forums built a few. One of the admin's knows a taxi driver in Denmark, so he has a box in the back window of a cab. I think he's number four or five on wigle. I call that cheating. :D
  5. You need someone to carry your toolbox? ;)
  6. Dude! If I had known I'd have bought you a beer at shmoo. Though I don't think you had enough hands to carry all the ones you had when I was talking to you....
  7. No, I just haven't had the forge running since I moved. Have to build a new one. Hot metal sparks in your shoe laces can be a bad thing.....
  8. Use Apple Remote Desktop. Also, if the net admin knows a student has root access to the computers and hasn't changed the password, he needs his ass handed to him, then shown the door.
  9. I only smoke when I'm on fire. I haven't caught myself on fire in quite a while.
  10. Just hide it inside a flower arrangement. You: Hi! I've got a flower delivery for Susanna. Receptionist: We don't have a Susanna here. You: Well This is the address. Want some flowers for your desk? Receptionist: Sure!
  11. Wow! My server is running on 127.0.0.24! We must be pretty close....
  12. When the COWF tables were created, the dictionary lookup was the only feasible way to test the security of a specific access point. Technically it still is. No one is going to make a dictionary with "a random array of 8 characters and add 5 random numbers to the SSID" in it. It'd take way to damn long to compute every possible permutation, and then you'd find you don't have enough space to keep the resulting file. The whole point of the COWF's files was to show; 1 That wpa has a usable vulnerability. 2 That dictionary passwords, i.e. real words, are a bad idea for passwords. They're not the end all be all of wpa cracking. Since the files were made, computer's have gotten faster. I'm pretty sure at the time the fastest desktop processor was a dual core pentium 4. Since then GPU based applications have come into existence. Multi-GPU cracking applications have also come into existence, just see pureh@te over at the BackTrack forums for this one. He's still using a specific word list though. He has about 450 million words on a machine with several Nvidia 295 GTX video cards running in parallel. The church used a cluster of FPGA boards and took about 3 days to generate the files. Had it not been for the FPGA cluster the same files would have taken over a month to generate at the current processor speed.
  13. I'm using a rebranded pharos usb 360. It came with streets and trips 2003. Have it hot glued to a spare suction cup cell phone dash mount. Which is then stuck to the inside of the sun roof in the Element. It's also a good place to Velcro my usb wifi adapter. http://twitpic.com/utfho I'm actually surprised how long it's stayed up there. I attached it right before the Christmas holidays, then drove to Georgia and back, it's still up there today.
  14. Yea, I think that's what we're going to do. Looking at adding an additional 8Gb of ram now, just in case, with the ability to add some more later. We're bringing in other locations file servers as well, so these have to work now. We'll add the support servers one at a time and adjust accordingly.
  15. How do you estimate how much memory you need for an Esx setup? Right now we have a Dell 2950 with 8Gb of ram. At the moment there's only one server 2003 vm running as a file server. Eventually we are going to have a few more servers running, that will be running back end services for pre-press imaging software support Photoshop, Illustrator, and Solid Works software plugins mostly). Right now the guys have a bunch of old ass computers and servers that were cobbled together to be "good enough" for what they do. The highest end of them only has 2Gb of ram and occasionally runs out. They are regularly pushing around multi-gig files, so I was going to configure the vm servers with 4Gb of ram. I know esx will make the servers only use what they need, and they'll probably never max out their ram at the same time, but knowing these guys it will happen. So should I configure the host machine to have the maximum of what the images are configured with? Does any of this make sense?
  16. Okay, so you give your fake access point, called "Bob's home network" a fake password. You then set it to broadcast at a higher wattage than the real "Bob's home network". Now when Bob tries to connect to his network, your spoofed router is what he's going to connect to. The beginning of the four way handshake isn't going to be the same as his real access point because the password is different. The exercise stops right here. You're not going to get the correct password this way. Usually in these cases it's only that one person that knows the password! I know my wife and our room mate have no clue what the password for our wifi is. Hell, I don't know what it is unless I look at the txt file on my thumb drive. It's hard to remember 64 random characters. Now this might work for a public hotspot. But then most public hotspots are open to the world anyway. You'd have to be careful with how long you run the rogue access point though. It's going to break a lot of folks' connections. They are going to complain to the owners, and when they can't get a connection they're going to start messing with the real access point's config.
  17. Where's this magical rescue disk that can break truecrypt encryption?? Yea, I'm calling BS to the OP's story as well.
  18. This may work at a public hotspot, maybe. Would most likely never work at a home or corp wireless network.
  19. Well so far it doesn't support the wifi card in the hp mini 1150. Stupid broadcum cards..... Works with my no name raylink based usb adapter though! Probably put Ubuntu 9.10 back on the hp.
  20. No. The rogue access point wouldn't ask for the key, since it won't have one.
  21. Heh, people always ask if I read their email all the time. I say nope, we have software do that for us. I don't read my own email, why the hell would I want to read other people's email..... No need for man in the middle. We control the network infrastructure. If I want to see where someone is surfing it's fairly trivial to port mirror their traffic to my desk. If their traffic is in an encrypted stream going to a nonbusiness related site, that site gets blocked. They want it unblocked they can get their manager to tell me to unblock it.
  22. I haven't seen any netbooks with a tpm chip.
  23. Last time I checked PDA net only worked on Windows. I use Windows as little as possible.
  24. I thought that was a myth...... I've been wardriving forever and have never seen a chalk.
×
×
  • Create New...