Jump to content

ellimistx99

Active Members
  • Posts

    5
  • Joined

  • Last visited

Everything posted by ellimistx99

  1. Yea that does seem quite complicated. Perhaps the other solution seems more plausible then. Figure out a way to have the user connect to your AP and then use a MITM and meterpreter to figure out a way to get their wifi password list. I was just looking for a way to get a WPA password without having to rely on brute forcing and dictionaries ^_^
  2. Yea that's what I was thinking. I don't think they would connect to my AP like that though. I mean, if my AP has the same SSID but unencrypted, and their device is looking for an encrypted AP will it still connect? I don't think it will.
  3. Haha fair enough. I'm trying it on my own router anyway, for fun, so there isn't a need to use a wrench haha. Brute forcing a non-english password will take forever, I mean AFAIK currently it's just dictionary attacks on a captured handshake to crack WPA. I was kinda hoping there was some other way sneaky way I could get the passphrase. I found some scripts that attempt to log invalid log in attempts, I can't make heads or tails of the script, maybe someone can actually tell if it's a checksum pass/fail type argument or something else that's workable Script 1 and Script 2.
  4. Hmm I mean, I'm actually attempting to capture the WiFi password. I'm going under the assumption that if they have a profile setup with an SSID that has, say WPA encryption, that when they see a similar SSID name on my router, the device will attempt to connect, send their passphrase which I'd like my router to capture. After which, I'd like to be able to connect to their own router to setup a potential MITM attack. Are you suggesting that there is a method that will allow them to connect to my router as long as I simply have the same SSID, no password, and later do a MITM attack to capture their WiFi password? To be clear I'm just looking for a way to get WPA passwords, after learning WEP attacks here, I figure I'd try to think of a way to get WPA passwords without having to do a dictionary attack on a captured handshake. Since I live in a country where the first language is not english, dictionary attacks are very very hard to do.
  5. Hello everyone, I'm new to the forums and for the most part new to the show, so please forgive me if this as been asked before. I have a router on which I managed to install the DD-WRT firmware. I was looking for scripts or addon's to the firmware that would log connection attempts, and capture the password. Something similar to the Jasager implementation. Basically I would change my SSID to the targets' and then just hope (or send deAuth packets to the original router) till a user attempted to connect to my router, at which point I would hope to capture the password. Does such a script exist for DD-WRT? Or perhaps point me in the correct general direction. Thanks.
×
×
  • Create New...