Jump to content

biob

Active Members
  • Posts

    267
  • Joined

  • Last visited

  • Days Won

    7

Everything posted by biob

  1. PsydT0ne , thanks for the reply. I have been watching Seytonic. It’s a good little podcast.
  2. biob

    Airmon on RPI 3

    Have you tried adding the essid as well? —essid someAP
  3. An example of a typical hak5 feed on YouTube:-
  4. Dear Hak5, don't mean to anger anyone with this post... but im finding myself missing the good old Hak5 podcasts. The days when we had tutorials based around hacking tools , readily available . It seems the show is now based purely on Hak5's amazing products. An as great as they maybe, they aren't very affordable outside of the US e.g. Wifi Pineapple nano, being £125 , from European supplier. i appreciate, that Hak5 is a business and they have to eat. But would it not be possible to setup another channel to provide the tutorials for the products you sell and get back to the old format? I mean, how's the Hak5 van? Has it been turned into a hacking mobile command centre? Have you guys built any custom gear of late e.g. Password cracking rigs, photo framed pc and all that goodness. I've even noticed a decline in the discussions and help that is available on the forums. please, please, please bring back the show we all loved and admired.
  5. Thank you for all your help, Haze1434. Hak5 forum, is not what it use to be. i will give that a go tonight. I totally forgot about piping outputs in to hashcat. Think I will try piping the output of the maskprocessor into hashcat too. i will post my result here if they work, just in case anyone else anyone else is interested. just out on interest, what is your hardware setup Haze1434?
  6. Managed to implement the rule in maskprocessor, but hashcat doesn't seem to have all the same options. Not at my PC so can't paste what I used yet.
  7. Isn't it just :-) It's an antique...GT545. Had the PC since approx 2011 i7 2600k.8Gb RAM. Only get 6.5-8k WPA hashes. Hence the attempt to learn how to streamline the process.
  8. Unfortunately my learning capabilities resolve around seeing an example.
  9. But then where would be the fun in learning :-) My PC is ancient by today's standard and would take 4.5 hours to crack 10^8. think I have my figure wrong
  10. Disclaimer: I have not interest in accessing networks that I don't have permission to do so. This is purely educational. Hi All, i currently have a very little WIFI pen test lab set up. I'm concentrating on wifi as my first task to learn. I have an AP setup with a password :12232890. I have successfully captured the WPA2 handshake. I now want to bruteforce my password. How can I setup a mask/rule for hashcat with following complexities? Keyspace:1234567890 Length:8 Pw: 12232890 No more than two of the same digits sequentially e.g ok:-22183456, not ok:-22213456 No more than 3 of the same digit e.g ok:-22124567, not ok:-22289456 No more than 1 double repeating digits e.g. Not ok:-11223344 or 11422055 or 11672289
  11. Is it possible to apply a filter to airodump-ng to show AP's with a similar ESSID. e.g ACME1234, ACME5678 ? obviously it can be done with BSSID's by applying a mask, but I can't find any examples that show it being applied to the ESSID. can someone please advise? Thank you.
  12. Must be a quirk..... have used airodump-ng on another device and no WEP seen from my little router.
  13. Hi, ive recently bought a Gl-Mt300a, running openwrt(OEM). I've installed aircrack-ng and it is running just fine. One thing I've noticed is while running aircrack is that the MT300A appears to be advertising a hidden SSID using WEP. My question is... is this a quirk to openwrt running aircrack or is this a hidden back door?
  14. Must be the best use of airodump yet. Never mind big brother is watching:-)
  15. Great rigs guys! It's a shame the Huawei E585 can't be turned into a wifi pineapple controlled and viewed by an android device, could be worn on a belt(Not so obvious to the people around). I really do like these rigs, keep up the good work guys.
  16. Av's do cause quite a few false negatives. Better safe then sorry.
  17. Does anyone else have problems logging into the hak5 when using the nexus 7? I'm unable to paste my password into the floating login screen. I've had to use an iOS device, feel like I've cheated on open source goodness :-(
  18. Badbass, I really think you need to start doing some research on the Internet before you ask a question. Its not a matter of tuning to get 802.11n at 150Mb/s(tuneable indicates a frequency). Do you know if the AP supports 802.11n? Chances are if your getting that ping time with both aerials then the limitation is either your wifi card or more likely the AP your connecting too. Even if the AP supports 802.11n, there will be other people connected to it so the connection speed will decrease as the amount of clients increases.Even other AP's can interfere with the AP your connecting to, thus reducing the connection speed. Sorry to sound harsh, but read up on wifi. Google is your friend with very basic questions like this. Hope this helped to answer your question.
  19. I think python is the easiest to learn. However for power and speed of applications, C is still king(and it's a lot easier to learn then assembly) and with C it can also be used for embedded device's.
  20. biob

    Cctv Mesh Network

    Just checked out the OWASP site. Thanks Digininja it's just what I'm looking for.
  21. biob

    Cctv Mesh Network

    Will do, thanks for the advice.
  22. biob

    Cctv Mesh Network

    Kismet seems to be unable to tell what channel they are operating on. Looking at some of the logs, I think they are using a channel 1,5,9 scheme. I have found a few without a CCTV unit attached. I may have to loiter Around one tomorrow:-)
  23. biob

    Cctv Mesh Network

    Hi Digininja, they are council. When I used my camera to zoom in they have a yellow sticker right at the top of the lamp post.( basically the sign they are suppose to put in clear view). I find it very interesting that the lamp posts have AP's.( just sad in my old age :-))
  24. After reading my post, it sounded very harsh, my apologises. Basically you have a dipole I beleave(which is the aerial connected to the lead) the other elements are the to collect the Rf and re-radiate them so the dipole collects a far great RF signal.(kind of like a lens). Hope this helps.
×
×
  • Create New...