Search the Community
Showing results for tags '802.11'.
Hello everyone, My name is Squidy P and it has been six months since my last....wrong forum? To soon? Anyway, this is my first post and I am new to true hacking and pentesting. I have been messing with Linux for years and really enjoy the OS and getting under the hood. After watching some the HakTips I realize that I don't know that much about wifi or radios in general. I am looking to get a USB wifi adapter for testing and getting my feet wet. I don't think I should start with the Pineapple, although I am salivating wanting to get my hands on it. I think if I got a Pineapple I would be like a teenager who found himself is a strip club for the first time...just wouldn't know where to start. I want to start small but with capability. Goal is to hack my own WPA2 password and I am pretty sure my Surface 3 (non-pro)'s wifi won't do monitor mode. Any suggestions on a good radio to start with?
I'm building a robot as a school project, the brain is a RPI with a wifi dongle, and I need a compass reading from an android phone at all times. I'm sure sooner or later someone will screw me with a deauth attacker, so I figured, as a backup system I would try sending the data inside a 802.11 frame and listening for it in monitor mode on the client end with a script using scapy. My question is: 1- In which type of frame is the best to embed the data (at least a byte)? 2- How fast and reliable would it be? alternatively: How to protect myself against deauth attack (Not plausible as far as I know). I know that I'm not meant to use 802.11 frames like this but it seems like an interesting idea ... Thanks for the help in advance!
Hi just wondering wether any one could clear this up for me, I have a Huawei wireless modem the 3g type now when I'm running wireshark i noticed that it send a constant stream of probe responses to ff:ff:ff:ff:ff:ff, now am i right in thinking that an AP will only send a response when receiving a request and why would you send a response to ff:ff:ff:ff:ff:ff also this is a constant stream not just once in a while and I cant see any probe requests being sent to the AP either. Is this normal or is there something wrong ?
You should hit update inside your WIFI-CRACKER or use the source below that has also been updated... UPDATE 3 : v1.2.3 is up and running with a couple fixes here and there since 2012... UPDATE : This is the new WIFI-CRACKER v1.2 where many things have been fixed and a few added. New functions include a updater and a packet sniffing menu. Same download link as before and you won't ever need to physically use it ever again ;) . Since this is my favorite IT show and because it inspired me to learn about wifi and write this script , I've decided that I will first post my WIFI-CRACKER script on those forums. WIFI-CRACKER is a Script that automated the hacking of wifi networks. It's completely created by me, in fact I made it today. It's a proof of concept and was created for educational purposes (since I was learning about wifi). I am planning to make it much more than cracking your neighbor's WIFI because honestly that's would be too easy for anyone on here. Currently, I want to add some more cracking options to the script as well as a DAuth menu. I'd appreciate if anyone wants to contribute on this project. Features : Mac spoofing with macchanger Target scouting with airodump-ng Cracking WEP and WPA/2 (with aircrack-ng and reaver) Debugging menu for fixing bugs Lots of small stuff to make the script as good as it can be Packet sniffing menu with tshark and wireshark *NEW* Updater function *NEW* Resume previous WPA hacking session *NEW* Fixed check_internet() Download link : Download Here Source code *UPDATED* :