Burning Aces
-
Posts
84 -
Joined
-
Last visited
Posts posted by Burning Aces
-
-
im not keen on backtrack they desperately need to include more drivers
or need some kind of autoupdate routine
now a full ubuntu backtrack would fookin rock !
way to make yourself look like a douche
backtrack has drivers, try searching
-
damn it double post
-
As for deauthenticating for other reasons, there's nothing stopping you using any other software but it really depends on what you're doing. The only other reason i can think of that you'd want to deauthenticate someone if you weren't wanting to crack WEP or WPA is so they accidentally authenticate with yourself instead (a la Jasager, Karmetasploit etc).
aireplay-ng (in this context) and airdrop-ng just do one thing: deauthenticate clients from access points. they dont gather any info or send anything out. what happens next and with what tools is up to the user to decide.
You might just want to piss some one off..or it could be at an AP you are already on and some one else keeps trying to dowload on it, so second wificard and start de-authing them :D
aircrack-ng neeeeeeeeds a gui1 it has a gui - Gerix Wifi Cracker NG
2 cli is alot more powerful than gui and you could actually learn something
3 the windows version already has a gui
4 your post is useless
-
nice :P
so infiltrator still want my ip?
-
airdrop just does what aireplay -* what ever for deauths does enmasse
it helps for capturing as people have to re handshake again and everything else
-
Radius authentication server, that's what corporates around the world uses for securing their wireless network. I am pretty sure there are other ways for securing it, but implementing a radius server seems to be the most effective method for securing a wireless network.
it is the most effective way really
Exactly, also a good idea to isolate WLAN from LAN so in the event wireless gets compromised their will be no access to our core systems only laptops and a couple of servers (which of course are protected but still :P)eg having 2 subnets and having all your main desktops on 1 and yeah what you just said :D
-
Just a few suggestions:
5. Review router/firewall for open ports.
As well as check for firmware updates
4. Check for a software firewall on PCs. Windows comes with one.
Comodo Free Personal Firewall, Cnet recommends and its a lot more secure than the windows built in.
7. If you're paranoid, take out any wireless devices. If not, at the very least, secure it using WPA2 and a strong passphrase.
Or if you are extremely paranoid, use a radius authentication server.
That's all I can think off.
now everyone talks about radius auth servers :|
-
Don't challenge me dude. What do I get if I win?
access to my system quite clearly
-
So how are you doing with that large password list? Finished uploading it yet or gave up.
shit i fell asleep and laptop went to standby. will do tommorow at work
-
same here
-
You can't insult Ubuntu for having a "not very smart" community and then suggest Gentoo or Arch.
you should be happy with me, i said fbsd as well
also arch's wiki and aur/repo's are pretty much best ive seen tbh
-
Thats how i used to do it :) Avast 5 + Comodo Firewall and Defense + works great
You did read that right? Lets start at the top shall we:
Solution status:
As stated on the website YOU provided 87% are patched already While 7% have workarounds and 7% are unpatched compared to windows that is secure.
Criticality:
Out of these only 7% are moderately critical 0% are above moderate (High and extreme) and 47% are Less and the other 47% are not at all.
Where:
Only 13% of these "holes" are remotely exploitable 87% are local (meaning any decent security on your network and you are safe (which provided hacking someone comp/network is always easier when you are on their LAN/WLAN)
Impact:
This is funny what are you worried about any ways the impact is:
60% are DoS (denial of service) any decent firewall would block these and if you are really paranoid use Bastille and limit them.
only 5% are system access
and 20% are priv escalation (which would need physical access or WLAN remote access
So i am fairly certain it is safer the windows! lol
woo you saved my ass..kind of
^5
-
My problem with anti-virus software is it is dependent on comparing software on your system against known "bad" software. Keeping anti-virus definition files up to date will help, but there will always be a percentage of malware in the wild that will be undetectable by anti-virus software.
An infected system, even after a thorough cleaning, should never be trusted again. I believe preventing the files from getting on your machine in the first place is a better solution than scanning after-the-fact.
"If you regularly have to clean dog shit off your shoes -- would you prefer to invest money in excellent detergents and shoe cleaner, or would you prefer to watch where you are walking?"
Right. Linux is way more secure than other operating systems. (yes, sarcasm)
Using a less-popular (and thus less-targeted) OS does not make you any more or less secure.
holy shit
FSCK
go back to fbsd
*hides
also point made, ill shut up
edit: what im meaning is you're less likely to get drive-by infected on Linux
edit edit: for av use AVG, is free and good
-
cp -a [directory here]
eg
cp -a /home/getabetternick/
would copy your home
-
The whole idea is pointless, just buy a netbook or any laptop, install Ubuntu or any other Linux distro. Swap out the wireless card with a cheap Atheros mini pci/e card. Install Karma or use karmetasploit.
whats with you people and ubuntu *shudders
ubuntu is a horrid distro, have you looked at thier community user base? its filled with "not very smart people"
use something like gentoo, fbsd or arch linux
-
I partly agree with that, but you still need to protect yourself no matter what. Even though Linux is a lot safer than windows, there are still viruses written for linux, not with the same numbers as there are for windows but its just a matter of time before Linux becomes a targeted system likewise windows.
You may be safe for now, but soon or later you will have to cope with it.
lol no good virii, exploits how ever yes :P
also even on my windows pc i dont have an antivirus as i only use it to play cracked games
should probably run AVG on it see how much it picks up haha
-
dont use an AV, install linux
-
the "best" is an ironkey...but i dont think it will work as a boot loader...it might though...somehow. lol
i jsut got a couple of 8 gigs from sams club and they work fine. and are decently fast (verbatim store and go, kingstons in reality)
beat me to my suggestion when i saw the topic, i thought iron key, but it wouldnt be useful in this case
-
That's really not what netstumbler was created for, and it's still supported.
http://stumbler.net/index.php?m=201002
Mac filtering is useless, and provides the same false sense of security as a deadbolt on a screen door.
or as i said radius auth server
-
If you want to check it unrar it in linux then use head to check the start and tail to check the end, if it looks like sequential chars then you've got the brute force dictionary
ugh ill leave it extracting over night, and post here tommorow
-
That isn't the one that is just the equivalent of a brute force list starting at a and ending at zzzzzz is it? A friend came to me with an amazing huge word list around the same size and it turned out to be just that and so was pretty useless in the end.
err tbh im actually not sure, as the only time i unrar'ed it was on windows and i was unable to open the file through standard notepad, and ive never needed to use it as i have smaller files that i update with any new passwords i find or use
-
As long as I can download it, it's good enough for me. Again, thank you very much.
alright, uploading now
-
I did not here anywhere in that video an answer to my question:
Read the BOLD words these are key to my question I already said i stood corrected on the Whole Disk Encryption what i asked after was different.
just wondering why haven't you posted these question on UBUNTU'S forum and asked on THIER irc chan, since they know about ubuntu not us, i run arch linux which is different to what you run
-
Correction, you may be able to use airodump-ng to detect non broadcasting SSIDs, but Kismet seems to be a good choice.
ahk yeah, fair enough
Deep Packet Inspection
in Security
Posted
or the vpn could be insecure
or the govt could be watching you :o