Jump to content

MediaCresta

Members
  • Posts

    5
  • Joined

  • Last visited

Everything posted by MediaCresta

  1. Something like this: https://www.google.com.co/url?sa=t&source=web&rct=j&url=%23&ved=0ahUKEwjXm_T_3r7VAhXJ1CYKHdb-AvgQwqsBCCYwAw&usg=AFQjCNF1sHlk2z9QIx28jtvfnGP_UlkifA. The another option it's setting-up a VPN, anyway with the two options, all client Internet data will pass through the rpi. How I setup the "outward connecting" and how this works.
  2. it´s possible to make a middle man attack in our proxy, i mean, i want to make a proxy server on a raspberry pi 3, and get all data (like wireshark when sniffs), incluying https requests. my second question is, how to make the data get in my server (the rpi) without configuring the modem and the dmz, something like redirect the request with a external server and a client on the pi. my internet company change mi modem recently, and even so when i configure the dmz on it, and the portforwarding, the external connections don't get in, im looking for a alternative. (again, sorry for my bad english)
  3. @i8igmac but, this vulnerability was discover nearly 2008. I do not know why there is almost no documentation about it.
  4. @digip thanks for your reply. So if I want to make this attack, is the same process than the wep attack ?. Reading the link that you post, I see that this kind of attack, isn't fully support by the aircrack suit, so it isn't functional ?, I will try it tomorrow.
  5. Hi, Anyone know a attack for WPA TKIP attack like, the famous wep recover key (I have a bad English so I will write the same in spanish), I mean, not a social engineering attack or brute force hash attack. Exploiting this vulnerability " http://mobile.wi-fiplanet.com/news/article.php/3784251/WPA-Vulnerability-Discovered.htm ". Hola, primero discúlpenme el inglés, no es mi idioma materno. quería saber si alguien sabe como explotar la vulnerabilidad de las claves WPA descritas en el hipervinculo, un ataque similar al wep para recuperar las claves. Gracias de antemano.
×
×
  • Create New...