Jump to content

Bigbiz

Active Members
  • Posts

    355
  • Joined

  • Last visited

  • Days Won

    10

Posts posted by Bigbiz

  1. Weird that approach may not work then?

    Im think two things either you didnt capture enough packets?

    Or you seem to have the commandline correct but it says  0 decrypted packets, so not a good approach.

    But you only have captured 12 wpa packets, you may need more before the actual encrypted packets pop up on the wire. For now id go with first answer.

  2. Prossesor speed good

    Need goOd RAM

    VGA card not neccessary but nice

    .pick and choose kind of like a gaming rig if you take a look on twitch.tv check out some of the big named twitchers Ninja

    Timthetatman Dr.Disrespect Summit1G

    I say they have pretty resonable hacking rigs. If they wanted to convert.

     

  3. 10 hours ago, Dave-ee Jones said:

    That's just Apple being Apple.

    And it depends on the MAC changer. I've had a few that don't affect much at all, and then I've had a really good one (the one that is used by Nethunter for Android) that does work properly, causing even the smartest routers to believe you're a completely different device.

    Of course, I don't recommend doing this for small networks as one day the admin's going to log onto the router and go "hmm, 21 unknown devices.." and get really paranoid and lock the network down even more.

    You bring up a good point, plus they wont even really worry about the MAC addresses really. Who would take the time to record this. Maybe in the future.

  4. Your getting into a concept called arp spoofing. MITM would arp spoof mac addrrsses bettween arp requestes. Disgusing one  mac address from the other. When connected in a network your mac address is only shown as say 00:00:00:00:02 and so on. Arp spoof would change to xx:xx:xx:xx:xx between a network of machines.arp requests would look fir the spoofed mac.

×
×
  • Create New...