-
Posts
355 -
Joined
-
Last visited
-
Days Won
10
Posts posted by Bigbiz
-
-
Wht u mean test your handshake? Use pyrit .
-
I feel the same as you.
But if you live in US UK or CANADA You may have to.
Update
https://www.engadget.com/2018/09/03/five-eyes-countries-anti-encryption-policy/
-
Would it be a good idea to have a backdoor installed in your encrypted data, for the authorities?
I sense some blackhat hacking inbound!
https://www.theregister.co.uk/2018/08/31/five_eyes_2018_meeting_encryption_terrorist_content/
-
I tried this before it didnt work, but maybe ill try follow this guide maybe itll work.
-
Nope never heard of a vlan. Enough packets could be like letting tcpdump run anywhere from 20 min to an hour.
-
Weird that approach may not work then?
Im think two things either you didnt capture enough packets?
Or you seem to have the commandline correct but it says 0 decrypted packets, so not a good approach.
But you only have captured 12 wpa packets, you may need more before the actual encrypted packets pop up on the wire. For now id go with first answer.
-
that should get ya going. Once you decrypted packets. You on your own.
-
Maybe confront him first, stating you will go to the authorities. Then change all your passwords. Maybe it isnt him? If it was would he admitt, it probly not.
-
Never heard of em. If u get close to 1 use a cheap police scanner!
-
-
A recon with a nethunter device.
-
Sounds like you say nefarious. Watch what you connect to for sure!!! If you moniter what you do should be ok.
-
Try coding programs for females. Too!
-
Thanx man
-
There should be a colum to see the highest rankinng hak5 mederator to the lowest if you consent to it. I consent.
-
I have #4 on the list. Its great
-
-
Prossesor speed good
Need goOd RAM
VGA card not neccessary but nice
.pick and choose kind of like a gaming rig if you take a look on twitch.tv check out some of the big named twitchers Ninja
Timthetatman Dr.Disrespect Summit1G
I say they have pretty resonable hacking rigs. If they wanted to convert.
-
10 hours ago, Dave-ee Jones said:
That's just Apple being Apple.
And it depends on the MAC changer. I've had a few that don't affect much at all, and then I've had a really good one (the one that is used by Nethunter for Android) that does work properly, causing even the smartest routers to believe you're a completely different device.
Of course, I don't recommend doing this for small networks as one day the admin's going to log onto the router and go "hmm, 21 unknown devices.." and get really paranoid and lock the network down even more.
You bring up a good point, plus they wont even really worry about the MAC addresses really. Who would take the time to record this. Maybe in the future.
-
Your getting into a concept called arp spoofing. MITM would arp spoof mac addrrsses bettween arp requestes. Disgusing one mac address from the other. When connected in a network your mac address is only shown as say 00:00:00:00:02 and so on. Arp spoof would change to xx:xx:xx:xx:xx between a network of machines.arp requests would look fir the spoofed mac.
-
Some routers also have the option to, broadcast a guest access point additionally to a wpa2 locked ap.?
-
Mac address will tell you the manufacturer of device
-
Python uses the programmer. Idle
Is this what you mean. Not sure
-
You change the password an forget it. Something happens and messes up the software. Upgrade for the software.
So I pissed off the feds ...
in Security
Posted · Edited by Bigbiz
Definitly freaky stuff. mind fu**ery is there middlename. on anothernote every week i set a mousetrap i catch a mouse there still seems to be a new one every week.