Jump to content

Berger

Active Members
  • Posts

    7
  • Joined

  • Last visited

About Berger

  • Birthday 06/14/1981

Contact Methods

  • Website URL
    http://
  • ICQ
    0

Profile Information

  • Gender
    Male
  • Location
    SD

Recent Profile Visitors

1,486 profile views

Berger's Achievements

Newbie

Newbie (1/14)

  1. I use kismet and then giskismet to generate a kml file to use with google earth
  2. Would it be possible to use something like this and make a usb->serial ?? http://www.nkcelectronics.com/breakout-boa...-to-ser232.html I used the above to connect my laptop to my atari 800xl computer... edit: also the nice part is that its small and it may fit in the fon case...
  3. I'll give a better explanation as to what the code is doing. The server portion is a linux based app that uses the pcap library to read in a pcap dump file(from airodump-ng for example) and look for the different access points and the data from them. It then looks for which ones are WEP and displays those for the user to choose which one to attempt cracking. It then loads up the IV and the DATA from the packet and waits for a client to connect. The client connects, receives the IV, what portion of the wep key to try, as well as the DATA section of the packet. It then runs RC4 on the data packet with the key, checks to see if the CRC is correct. If it is it sends the key back to the server for it to check the rest of the collected packets to make sure it is not a false positive. If it is not correct, it continues on cracking. Therefore it is possible to have a client run under windows,linux,etc. because it does not rely on libpcap, it just needs to be able to do RC4. So really its just a big distributed system for cracking 64bit wep keys. Hopefully that explains things better. -Berger
  4. For the client you'll want to download cygwin from http://www.cygwin.com/ when installing you can install packages, I'd suggested gcc libgcc libstdc++ make as well as the openssl-dev I believe that should be it after installed you should have a home directory in the folder where cygwin was installed, you can extract the client code there and then compile it. I do have a w32 native exe, but the rc4 I was doing was slower than the openssl one. I'll see if I can speed that up quick. Edit: I finished the command line win32 client and posted it on my site
  5. Hopefully this is the right area (I lurk a lot) I built a client/server bruteforce wep cracker. I had been using Johnny Cache's jc-wepcrack and had been getting false positives, so I decided to make my own. The server currently runs under linux, while the client works under linux,solaris,bsds, and cygwin. Hopefully someone else will find this useful as well. http://www.bergera.com/code/wep.html -Berger
  6. I ended up getting a FPGA kit and a ATMEGA128 board as well, some how I was able to get through, too the better part or 2 hrs (from getting stuff in my cart and logging in before hand). I did get my confirmation email... Its interesting to see the write up on their site of how much they got hit.
  7. I was able to get around this by installing from the tarball, then I needed to do the symbolic link from the guide, and moved the www stuff over as well
×
×
  • Create New...