Wi Fi (Wireless Fidelity) are connection without cable as handphone by uses radio so user technology it that transfer can presto data. Wi Fi not only gets is utilized to access Internet, Wi Fi can also be utilized to make network without cable at corporate. In consequence a lot of person associates Wi Fi with “ freedom ” since technological Wi Fi gives freedom to its user to access Internet or transfering is data of meeting's room, hotel room, campus, and marked café café “ Wi Fi Hot Spot ” .First it Wi Fi is attributed for using up wireless set and Local Area Network (LAN), but more currently a lot of is utilized to access Internet. It can someone with computer with wireless card (wireless card) or digital personal assistant (PDA) to most link with Internet by use of access dot (or knew by hotspot) hovered.
Specification
Wi Fi is designed bases IEEE'S specification 802.11. Currently there is four variations of 802.11, which is: 802. 11a, 802. 11b, 802. 11g, and 802.11n. Specification b constitute product is Wi Fi first. Variation g and n constitutes one of product which have majority sell on 2005.
Wi Fi's specification
Frequency speed specification
A brass band Match
with
802. 11b 11 Mb / s 2.4 GHz b
802. 11a 54 Mb / s 5 GHz A
802. 11g 54 Mb / s 2.4 GHz b, g
802. 11n 100 Mb / s 2.4 GHz b, g, n
Technically operational, Wi Fi constitutes one of communications technology and information variant that employs at WLAN'S network and peripheral (wireless local is network's area). In other words, Wi Fi is trademarked certification that given by manufacturer to telecom peripheral (Internet) one that works at WLAN'S network and have accomplished interoperasi's capacity quality that is qualified.
Internet technology gets Wi Fi's basic is made and is developed a group United States Of America engineer that employs at Institute Of Electrical And Electronis Engineers (IEEE) base peripherals technical default get number 802.11b, 802. 11a and 802.16. Wi Fi's peripheral actually not only can work at WLAN'S network, but also at Wireless's network Network's Area Metropolitan (WMAN).
Since peripheral with standard technical 802.11b destined for WLAN'S peripheral that is utilized at frequency 2,4 GHz or prevalent ones to be called ISM'S frequencies (Industrial, Scientific and edical). Be for peripheral what does get technical default 802.11a and 802.16 destined for WMAN'S peripheral or also so-called Wi Max, one that around working frequency band 5 GHz.
Wi Fi's excess
In height society energy in particular among Internet community utilize Wi Fi's technology because of at least two factors.
1 ) easy access. Its mean, users in one area gets to access Internet concurrently without needs to be fussed by cable.
2 ) user that wants to do surfing or browsing is news and information at Internet, adequately takes in PDA (digital pocket assistance) or adequate laptop Wi Fi goes to place where exist access point or hotspot.
Mushrooming it hotspot at that place one built by telecom operators, internet service provider even individual person triggered by second factor, namely because its development cost that relative cheap or just ranging 300 United States Of America dollars. Also one of excess from Wi Fi is its speed that several times faster of cable modem the quickest one. So user Wi Fi no longer has to be in office room for working
Wi fi Hardware
Hardware wi fi who is at currently marketing available as
Wi fi in forms PCI Wi Fi in forms USB
There is 2 Wi Fi's connection access mode, which is
Ad hoc
This connection mode is mode where severally computer most straightforward link, or more recognised with Peer To Peer's terminology. Its gain, less expensive and practical if connected one just 2 or 3 computers, without has to buy access point
Infrastructure
Utilizing Access Point that functioning as regulatory as data traffic, so enabling a lot of Client can mutually most link pass through network (Network).
Infrastructure
Utilizing Access Point that functioning as regulatory as data traffic, so enabling a lot of Client can mutually most link pass through network (Network).
Weakness on wifi
Its is easily dihacking by hacer to steal password wi fi's user
Trick is as follows:
We first have to know distinctive among network Hub and Switch:
* On hub's network all data which is adrift at network can be seen / took by computer whichever that is at origine network that computer requested that data, if is not requesting yes is not coming.
* On switch's network just computer that do data interchange that can see that data, other computers don't deserve requesting that data.
Its problem is price from router hub and switch is not far cry so mostly present place have utilized switch's method that wents hard with for network hacking.
Hacking this utilizes tech :
* Sniffing
* ARP Poison Routing
* Sniffing
* ARP Poison Routing
Both of above Tech won't can be prevented by firewall whatever at victim computer, secured.
Important Note: ARP Poison Routing that because denial of service can (pack) on one of / all computer on network you Excess:
* Won't be detected by firewall type and break even whatever since its weakness lays in network system be not on its computer
* Can steal all type logs in password that server thru HTTP
* Can steal all logs in password person that is at Hub's network up to program is activated
* To ARP Poisoning can be utilized to steal password at HTTPS
* All program it free
* For network Switch shall at ARP Poisoning 1 first and bandwidth you will be eaten a lot of for its thing (if inet super quick no problem)
* Tofu / don't by admin network outside takes on answer me
Beginning from here looks on that at network in this story available 3 computers, which is:
* Victim computer
* Hacker's computer
* Server
* Can steal all type logs in password that server thru HTTP
* Can steal all logs in password person that is at Hub's network up to program is activated
* To ARP Poisoning can be utilized to steal password at HTTPS
* All program it free
* For network Switch shall at ARP Poisoning 1 first and bandwidth you will be eaten a lot of for its thing (if inet super quick no problem)
* Tofu / don't by admin network outside takes on answer me
Beginning from here looks on that at network in this story available 3 computers, which is:
* Victim computer
* Hacker's computer
* Server
First steps:
1. Network type cheque you, you are at switch / hub's network. If you are at hub's network thanks since hacking's process you will far easier.
2. Download needed program which is Wireshark and Cain & Abels. Code:
http://www. wireshark. org / downloads. html
http://www. oxid. it / cain. html
1. Network type cheque you, you are at switch / hub's network. If you are at hub's network thanks since hacking's process you will far easier.
2. Download needed program which is Wireshark and Cain & Abels. Code:
http://www. wireshark. org / downloads. html
http://www. oxid. it / cain. html
Trick Utilizes WireShark:
* Run wireshark's program
* Ctrl key press + k (capture's click then option)
* Ensure content on Interface is your Ethernet Card one makes towards network, if doesn't substitute and ensures too that “ Capture Packets In Promiscuous mode ” on
* Knobbed click starts
* Knobbed click stops after you are selfconfident that there is password up to you ingoing presses switch to start
* You can see all packet's type ingoing and sticking out at network (or on your computer just if network you utilize Swtich
* To analysis its data rights click on data that wants at analysis then click “ Follow Stream's TCP ” and safe analistic its package (I won't word its trick because I can't)
* One that clear of that data must in it exist information that inserted by victim goes to website conversely
Trick upon just applies if network you are Hub is not switch
* Run wireshark's program
* Ctrl key press + k (capture's click then option)
* Ensure content on Interface is your Ethernet Card one makes towards network, if doesn't substitute and ensures too that “ Capture Packets In Promiscuous mode ” on
* Knobbed click starts
* Knobbed click stops after you are selfconfident that there is password up to you ingoing presses switch to start
* You can see all packet's type ingoing and sticking out at network (or on your computer just if network you utilize Swtich
* To analysis its data rights click on data that wants at analysis then click “ Follow Stream's TCP ” and safe analistic its package (I won't word its trick because I can't)
* One that clear of that data must in it exist information that inserted by victim goes to website conversely
Trick upon just applies if network you are Hub is not switch
Of trick upon you gets to know that network you are hub / switch by sees on Source's IP column and Destination's IP. If on each row either one both constitute your IP therefore gets to be ensured by your network is switch's network, if don't yes mean contrariwise.
Trick Utilizes Cain & Abel:
* Purpose programs this far easier and simple than utilizes wireshark, but if you want all packet already comes out and input be suggested by you utilize wireshark's program
* Open programs your Cain
* Click on sectioned configure
* On part “ Sniffer ” elective ethernet card who you will utilize
* On part “ HTTP Fields your ” has to add username fields and password fields if your one wants not be at list.
* Purpose programs this far easier and simple than utilizes wireshark, but if you want all packet already comes out and input be suggested by you utilize wireshark's program
* Open programs your Cain
* Click on sectioned configure
* On part “ Sniffer ” elective ethernet card who you will utilize
* On part “ HTTP Fields your ” has to add username fields and password fields if your one wants not be at list.
For example I will inform that if you want your hack password Friendster has to add at username fields and passworsd fields says name, to another one you can look for it by presses right click view source and you shall look for input variable of log in and password website that. Already is at default tasted was enough fledged, you can steal pass that is at Indosat without adds whatever.
* apply setting afterwards and OK click
* At main menu to be gotten 8 tabs, and one will be worked through just 1 tab which is tab “ Sniffer ” in consequence chooses that tab and don't moves of that tab to prevent your alone confusion
* Activate Sniffer by sniffer's switch click whatever available upon that tab tab, look for switch that its writing “ Starts / Sniffer's Stop ”
* If you are at hub's network now you can know password ingoing by tab click (This time tab whatever available under is not one in the middle, one that is intermediated was no need at clicks again) “Passwords ”
* You stay to choose password of connection which that wants you see will be registered over there
* If you apparently are at switch's network, this need struggle more, you shall activate APR that key there is right beside Sniffer (And it is uncertified successful because manage from switch more complete go away & secure from hub)
* Before is activated on under-side sniffer tab elective APR
* Will visually 2 numbers list who is still gawp, list's click gawps upper then switch click “ + ” (Its form is such a) one that is at juxtaposed sniffer APR's switch etc.
* Will there is 2 numbers field that meaty all host that is at your network
* Connective among gateway's victim and internet protocol address internet protocol address server (to know gateway's address server clicks to start on comp you choose run cmd's type then ipconfig's type on command prompt)
* Afterwards new activates APR, and all data from comp victim goes to server you can see similarly.
* At main menu to be gotten 8 tabs, and one will be worked through just 1 tab which is tab “ Sniffer ” in consequence chooses that tab and don't moves of that tab to prevent your alone confusion
* Activate Sniffer by sniffer's switch click whatever available upon that tab tab, look for switch that its writing “ Starts / Sniffer's Stop ”
* If you are at hub's network now you can know password ingoing by tab click (This time tab whatever available under is not one in the middle, one that is intermediated was no need at clicks again) “Passwords ”
* You stay to choose password of connection which that wants you see will be registered over there
* If you apparently are at switch's network, this need struggle more, you shall activate APR that key there is right beside Sniffer (And it is uncertified successful because manage from switch more complete go away & secure from hub)
* Before is activated on under-side sniffer tab elective APR
* Will visually 2 numbers list who is still gawp, list's click gawps upper then switch click “ + ” (Its form is such a) one that is at juxtaposed sniffer APR's switch etc.
* Will there is 2 numbers field that meaty all host that is at your network
* Connective among gateway's victim and internet protocol address internet protocol address server (to know gateway's address server clicks to start on comp you choose run cmd's type then ipconfig's type on command prompt)
* Afterwards new activates APR, and all data from comp victim goes to server you can see similarly.
You can carry on both of above program concurrently (Cain for APR and wireshark for packet sniffing) if wants more result maximal.
Password who you can steal are password that is at HTTP'S server (server that don't encrypted), if that data is at server that encrypting therefore you that descryption shall that data before gets password (and it will need far steps longer of hack way this)
For terminology that don't searchable understanding at wikipedia (but yes england one if that eurasian jg was obviously there is).
teknologis's ala good frequency band 2,4 GHz and also 5 GHz that becomes technological operational container Wi Fi not releases from limitation.
Its section, user in an area justs receive to utilize wireless Internet system this with optimal, if all peripheral that is used on those area utilize beam energy uniformly and circumscribed.
If that precondition is unheeded, can be ensured will happen harmful interference is not just among Internet user peripheral, but even with another telecommunication system peripheral.
If that interference is continued because its user wants more superior of another user, and also reducing hence it grasp to its technology limitation in the end will make frequency band 2,4 GHz and 5 GHz can't utilize optimal alae.
If that precondition is unheeded, can be ensured will happen harmful interference is not just among Internet user peripheral, but even with another telecommunication system peripheral.
If that interference is continued because its user wants more superior of another user, and also reducing hence it grasp to its technology limitation in the end will make frequency band 2,4 GHz and 5 GHz can't utilize optimal alae.
Other limitation of both of wireless frequency band this (notably 2,4 GHz) it because also been utilized for ISM'S need (industrial, science and medical).
Its consequence, radio communication purpose or other telecom peripheral that employs at that frequency band has trouble ready for receiving of ISM'S peripheral, as it were most decants deep S5.150 of Regulation's Radio.
In THAT recommendation r SM.1056, informed also ISM'S peripheral characteristic that on in essentials intent prevents to arise it interference, well among ISM'S peripheral and also with other’s telecom peripheral.
Recommendation saming to bear out that each THAT member free establishes administration stipubting and bound up law order with energies limiting compulsion.
Realising limitation and impact who may arise from second band purpose that wireless frequency, a variety state then establishes regulation that draws the line to energi peripheral beam that is utilized.
Realising limitation and impact who may arise from second band purpose that wireless frequency, a variety state then establishes regulation that draws the line to energi peripheral beam that is utilized.
Wireless's signal wireless LAN's signal normal it can be a prey to on surrounding gyration 200 meters from access point, but client what does utilize external antenna can catch signal until in as much as 1000 meters. If you place AP near door or window, can be ensured neighbour gets following enjoy internet access or do sniffing to traffic network.
If that wireless LAN's infrastructure involve wireless's connection among high building, therefore client undesirable can do sniffing of down insofar until 2.500 foots (762 meters). So wireless LAN's signal despite ISP that atop paired high building gets at sniffing of down (known as war flying).
If that wireless LAN's infrastructure involve wireless's connection among high building, therefore client undesirable can do sniffing of down insofar until 2.500 foots (762 meters). So wireless LAN's signal despite ISP that atop paired high building gets at sniffing of down (known as war flying).
If you want connect Internet utilizes wifi you temporary go away AP or of available wifi place you that neared can self with those area and that main can Internet one please it with
stage as follows
1 ) You shall have USB Wireless Adapter. One that you can get at computer stores at the price ranging Rp 210.000 (adequately is a steal for technology as sophisticated as this) + antenna UHF forms parabola.
2 ) This stage constitute key stage, which is by use of antenna UHV what does get to form Grid Parabolic as Reflector to strengthen signal.
3 ) For over strengthen reflexy's energy from parabole you can add mesh wiring on exhaustive surface, then don't forgets at screw with parabola frame. You can also add foil's aluminum.
4 ) Assemble USB WiFi Adapter on aught stanchion in the middle parabola. If over-long of its focus can be cut.
Labour that USB WiFI lays in parabola focus. Remember focus formula parabola. If this doubt its simple formula.
F= D. (square) / 4 ( squares). c
D: parabolic diameter
C: parabola depth
5 ) USB'S cable tide( High Speed 2.0 usb cable system) in such a way face.
6 ) Then stanchion back tide USB Wifi on parabolic. Tide on iron pipe to water down antenne so delicate is turned around.
7 ) If all trough install driver USB WiFI previously (factory deliverance).
Then install “ NETWORK STUMBLER ” to look for strong and closest signal.
antenna's tide outboard and inserts USB'S cable on your computer port. Scan with Net Stumbler. Sought for network which do’nt ’ at ENCRYPT and its distance most near with you. Then join now.
Access goes to wifi:
type:
secure, its mean for gets to access us shall insert password
1 ) You shall have USB Wireless Adapter. One that you can get at computer stores at the price ranging Rp 210.000 (adequately is a steal for technology as sophisticated as this) + antenna UHF forms parabola.
2 ) This stage constitute key stage, which is by use of antenna UHV what does get to form Grid Parabolic as Reflector to strengthen signal.
3 ) For over strengthen reflexy's energy from parabole you can add mesh wiring on exhaustive surface, then don't forgets at screw with parabola frame. You can also add foil's aluminum.
4 ) Assemble USB WiFi Adapter on aught stanchion in the middle parabola. If over-long of its focus can be cut.
Labour that USB WiFI lays in parabola focus. Remember focus formula parabola. If this doubt its simple formula.
F= D. (square) / 4 ( squares). c
D: parabolic diameter
C: parabola depth
5 ) USB'S cable tide( High Speed 2.0 usb cable system) in such a way face.
6 ) Then stanchion back tide USB Wifi on parabolic. Tide on iron pipe to water down antenne so delicate is turned around.
7 ) If all trough install driver USB WiFI previously (factory deliverance).
Then install “ NETWORK STUMBLER ” to look for strong and closest signal.
antenna's tide outboard and inserts USB'S cable on your computer port. Scan with Net Stumbler. Sought for network which do’nt ’ at ENCRYPT and its distance most near with you. Then join now.
Access goes to wifi:
type:
secure, its mean for gets to access us shall insert password
unsecure, our mean can access wifi without has to fill in password, jd directly conect.
One that unsecure, sometime also can't access Internet although connect can go to network. It because available IP arrangement. For server what does utilize dynamic IP, therefore we no need dizzy with IP, since sdh's IP automatic inserted by server goes to client (our computer).
One that unsecure, sometime also can't access Internet although connect can go to network. It because available IP arrangement. For server what does utilize dynamic IP, therefore we no need dizzy with IP, since sdh's IP automatic inserted by server goes to client (our computer).
For server what does utilize static IP, therefore we shall manually insert IP for computer / laptop we.
If we conect can go to wifi tp can't internet access, IP alternate attempt your laptop.
Its trick:
right click icon wifi under right display
vote for properties
vote for Advanced
on connection's part chooses Protocol's Internet (TCP/IP)
vote for static IP
on loading IP: 192. 168.0. 212
on Net Mask fills: 255. 255. 255. 0
on getway fills: 192. 168.0. 1
on dns server fills: 192. 168.0. 1
Its trick:
right click icon wifi under right display
vote for properties
vote for Advanced
on connection's part chooses Protocol's Internet (TCP/IP)
vote for static IP
on loading IP: 192. 168.0. 212
on Net Mask fills: 255. 255. 255. 0
on getway fills: 192. 168.0. 1
on dns server fills: 192. 168.0. 1
Hacking MAC address's
1. Run Live CD distro Linux BackTrack
2, insert username “ root ”, then inserts
password “ toor ”.
3. After emerges prompt, ketikkan “ startx ”.
4. After emerges environment KDE's desktop, knobbed click “ k ” (at bottom left corner). Vote for
BackTrack? Network Analysis's radio -> 80211? Analyser? Kismet.
5. Then window's appearance “ select Network Device ”, vote for “ wifi0 ”. Click “ OK ”.
6 .Kismet's appearance appearance, automatically Kismet will look for wireless client that be active. If found by wireless client that active but not most link with network,
therefore will emerge order “ ALERT: Suspicious client 00:02:6F:37:08:20 – probing
networks but never participating.”
7. If Kismet successfuling to find Access Point that active, therefore will emerge order “ Found
IP 192.168.2.1 for kotik::00:0E:2E:C2:2C:0E via ARP ”.
Information:
kotik -> SSID'S name
8. Kismet's close, then console's open to carry on tools scanning the other, namely
airodump.
kotik -> SSID'S name
8. Kismet's close, then console's open to carry on tools scanning the other, namely
airodump.
Information:
If we utilize to program scanning the other, usually first program will
making our driver wireless “ damage ”. To get is utilized on program secondly,
we need to fix driver that (switched off then is reanimated).
If we utilize to program scanning the other, usually first program will
making our driver wireless “ damage ”. To get is utilized on program secondly,
we need to fix driver that (switched off then is reanimated).
9. Trick fixs driver, type:
#airmon ng -> to testing interface that available.
Deadly driver “ ath0 ” and “ ath1 ” by types:
#airmon ng stops ath0
#airmon ng stops ath0
#airmon ng stops ath1 -> if interface ath1 there is.
10. Activating driver a new one, type:
#airmon ng starts wifi0
11. If typing commands #iwconfig, therefore information appearance “ ath0 ” was active with
Mode=Monitor.
12. Next, #airodump's type ng ath0
13. Thus therefore that conclusion with airodump gets to usufruct scanning
Faster Address Client MAC than by use of Kismet. But
Client is IP Address can't be gotten, but utilizes Kismet.
14. We can also utilize program k MAC (or you can revamp Address's MAC
via regedit) one that at install on windows to revamp Address Wireless's MAC we
as MAC Address one of client which is registered on Address Filtering's MAC.
15. One that needs to be done is look for Address Client's MAC information with’s Kismet or airodump, note that Address's MAC, then runs k MAC at windows and
change MAC Address.
16. After restarts computer / laptop you, and beginning gets free Internet ……..
Mode=Monitor.
12. Next, #airodump's type ng ath0
13. Thus therefore that conclusion with airodump gets to usufruct scanning
Faster Address Client MAC than by use of Kismet. But
Client is IP Address can't be gotten, but utilizes Kismet.
14. We can also utilize program k MAC (or you can revamp Address's MAC
via regedit) one that at install on windows to revamp Address Wireless's MAC we
as MAC Address one of client which is registered on Address Filtering's MAC.
15. One that needs to be done is look for Address Client's MAC information with’s Kismet or airodump, note that Address's MAC, then runs k MAC at windows and
change MAC Address.
16. After restarts computer / laptop you, and beginning gets free Internet ……..
nb:if there is handicap in test-driving damage is at our computer urge
that you shortly do steps as follows
that you shortly do steps as follows
1. if hack rather distress …
this will more lovely.. wakakakakakak …… sister..And brother
2.ask for ma parent’s bless ……………………………… intention makes to buy laptop….
hihihihi …
3.don't forget pray a that soon materialize its requisition aminnn ….
this will more lovely.. wakakakakakak …… sister..And brother
2.ask for ma parent’s bless ……………………………… intention makes to buy laptop….
hihihihi …
3.don't forget pray a that soon materialize its requisition aminnn ….
K MAC pleases to download
Herein
Or
Herein
hack WEP's trick 128 Wi Fi's bits
Basically setting security on Accesses Point (AP) consisting of umpteen mode, but average utilizes setting that simple to make easy acces. Since sometimes security zoom excelsior therefore convenience zoom on the wane. WEP is Wired Eqivalent Privacy, one that length goes to y. 64 its bits just 10 heksadesimal's number digit or 5 alpha numeric's digits, meanwhile for 128 bit go to y. consisting of 26 heksadesimal's digits or 13 alpha numeric's digits. peograming wep's algorithm comes under into RC4'S algorithm, where exists weakness on ekryption this which is marks sense byte's repetitive so enabling for dicrack if variable ivsnya suffices. While do hacking wep's process, utilizing familial OS Linuk slackware which is backtrack version 2.0
Finals, laptop Compaq V3103TU Presario V3000 wield to wield usb wireless adapter DWL g 122 rec c v.3.0.Trick generically steps it is as follows:
1. Run OS Back Track V.2.0 Final with Laptop. Then adapater usb wifi's configuration cheque with shell. Type it:
Ifconfig rausb0
Iwconfig rausb0
2. After configuration is finished, then runs airodump ng to know channel gets what do active, what is ssid's name, MAC / client gets whatever already connect, there is don't it filrtering MAC, one that of course it to make easy us do monitored with to utilize shell type:
airodump ng rausb0
3. After know target is at channel gets what, ssidnya what, essidnya what, there is don't it client that konek, therefore cancels airodump ng from shell by presses control + c. then e.g. we want to attack essid judhyn bssid 00:18:F8:36:83:47 its operations at channel 8, therefore to catch package that emitted by AP (Access Point) that therefore runs instruction:
iwconfig rausb0 is mode monitors channel 8
airodump ng — channel 8 –ivs w namafile rausb0
shell this doesn't be closed until getting to y. wep on steps aircrack ng
4. Afterwards, if lan's activity little bit, its mean no client what does connect, shall utilize Fake Authentification by opens new shell, then typing:
Aireplay ng 1 30 e judhyn †“ a 00:18:F8:36:83:47 h (address's MAC that at concedes conect) rausb0
Does fake authentification until answer reply appearance:Authentification successfulKeep live is packet do missionary goes on until getting to y. wep on steps aircrack ng
5 Then shell ways the others to do arp request's hypodermics (in this case just card most indeed supportive to do hypodermic), run command:
Aireplay ng 3 †“ b 00:18:F8:36:83:47 h (address's MAC that at concedes conect) rausb0
Then stays behind to wait that arp's package hypodermic most arp request's ship and package is accepted, accepted package as ivs's package this will be kept deep first file previous above while clear a root shell airodump ng — channel 8 –ivs w namafile rausb0
6. To cracking password wep, while waits collected package, shell's road type new
aircrack ng †“ e CIPUTIH b 00:18:F8:36:83:47 (file name). ivs
then aircrack ng it will look for all possible goes to y. wep . Sit out until get display
To y. Found (B1:92:27:EF:6E) Probability 100%7. deadly shell airodump ng, aireplay ng, then shell's open new. Then does otentification by:
iwconfig rausb0 is managed's mode †“ e CIPUTIH goes to y. B1:92:27:EF:6E
then does dhcp's automatization with typed commands:dhcpcd rausb0
then does ping to go to one of web site e.g.:yahoo.com's ping
if is answer of TTL=bla's ping how means you was connected to Internet
Ifconfig rausb0
Iwconfig rausb0
2. After configuration is finished, then runs airodump ng to know channel gets what do active, what is ssid's name, MAC / client gets whatever already connect, there is don't it filrtering MAC, one that of course it to make easy us do monitored with to utilize shell type:
airodump ng rausb0
3. After know target is at channel gets what, ssidnya what, essidnya what, there is don't it client that konek, therefore cancels airodump ng from shell by presses control + c. then e.g. we want to attack essid judhyn bssid 00:18:F8:36:83:47 its operations at channel 8, therefore to catch package that emitted by AP (Access Point) that therefore runs instruction:
iwconfig rausb0 is mode monitors channel 8
airodump ng — channel 8 –ivs w namafile rausb0
shell this doesn't be closed until getting to y. wep on steps aircrack ng
4. Afterwards, if lan's activity little bit, its mean no client what does connect, shall utilize Fake Authentification by opens new shell, then typing:
Aireplay ng 1 30 e judhyn †“ a 00:18:F8:36:83:47 h (address's MAC that at concedes conect) rausb0
Does fake authentification until answer reply appearance:Authentification successfulKeep live is packet do missionary goes on until getting to y. wep on steps aircrack ng
5 Then shell ways the others to do arp request's hypodermics (in this case just card most indeed supportive to do hypodermic), run command:
Aireplay ng 3 †“ b 00:18:F8:36:83:47 h (address's MAC that at concedes conect) rausb0
Then stays behind to wait that arp's package hypodermic most arp request's ship and package is accepted, accepted package as ivs's package this will be kept deep first file previous above while clear a root shell airodump ng — channel 8 –ivs w namafile rausb0
6. To cracking password wep, while waits collected package, shell's road type new
aircrack ng †“ e CIPUTIH b 00:18:F8:36:83:47 (file name). ivs
then aircrack ng it will look for all possible goes to y. wep . Sit out until get display
To y. Found (B1:92:27:EF:6E) Probability 100%7. deadly shell airodump ng, aireplay ng, then shell's open new. Then does otentification by:
iwconfig rausb0 is managed's mode †“ e CIPUTIH goes to y. B1:92:27:EF:6E
then does dhcp's automatization with typed commands:dhcpcd rausb0
then does ping to go to one of web site e.g.:yahoo.com's ping
if is answer of TTL=bla's ping how means you was connected to Internet
To hacking wep 64 bits usually a lot of it packages that needed around 250 thousand ivs more, to wep 128 bits 500 thousand or more.
Reference:
http://www. remoteexploit. org /
http://www. echo. or. id /
http://www. netstumbler. org /
http://www. aircrackng. org /
http://www. swik. net /
http://www. securityfocus. com /
http://www. wififorum. pl /
membobol Access Point
Sometimes AP is not set by the Admin … can be caused since lazy Admin or really have no gnostic about “ How To Set AP ”
If so is its condition as it is meant we benefitting can process “ Default Gaining ” … its means we try to insert ‘ account + password default ’ its factory deliverances.
how is its trick …. adequately knows product AP and series just …. so, if do’nt knows why …??
how is its trick …. adequately knows product AP and series just …. so, if do’nt knows why …??
yes tries to look for that…..
hhhhiikkss … if at my place job … that peek can of AP brand window its that what …
and if I scanning its AP with NetStumbler.. its AP name that is still default “ Linksys ” …. so,
I try answered password default … but still false goes on … how lets to know password default …
hhhmmm … it’s easy ….
. Inet's access.. if don’nt know there is yes goes to warnet …
. url: http://www. cirt. net / cgi bin / passwd. pl
. vote for menu: search Default Password
. Insert Merk Product
. Jrengggg … jrenngggg …. Getting the password default ….
default passworld
download here
download here
NETSTUMBLER
wifi's tip this time devotes tool or freeware Netstumbler's software that tremendously popular among wireless's activist, tool this walks at Windows environment, with tool this we are can detect wifi's network signal that again active, with know active signal current, we can big monitor its interference at environmentally we lie, Netstumbler this can also catch more wifi signal not nearly that can be a prey to by innate monitoring software device wifi standard. Generally tool this used to need hacking, network configuration examination, survey outgrows it interference, finding place that desert of wifi's network, and posisioning is accuracy aims antenna (pointing). Unhappily netstumbler this can be missised by person to find vulnerable wifi network security, then she can slightly utilize effort for hacking, so that internet can no charge. Therefore uses maximal security stage on point's access you, if your point access security WEP and WPAnya Is active, therefore Netstumbler will arise padlock image on signal wifi that WEP or WPAnya Is active, so don't trial and error despise to take proceedings.
Despitefully Netstumbler can do channel channel's monitoring that is used, wifi's signal force, featuring SSID that detected. Netstumbler that between can also with GPS'S peripheral, accordingly we can map wifi's network that lies on one place, this usually been done while walking, also report Address's MAC accesses frequency plus point its operation, noting noise's level, and its compare with level tries a fall signal.
So is wifi's tip this time give tips to you to men disable broadcast SSID you that wifi's network you cover-up, can't be detected again by Netstumbler or another tool one a sort (even so available many tool that can monitor SSID already most hidden / cover-up), tool is this Marius Milner's brand can be downloaded free at www. netstumbler. com .
So is wifi's tip this time give tips to you to men disable broadcast SSID you that wifi's network you cover-up, can't be detected again by Netstumbler or another tool one a sort (even so available many tool that can monitor SSID already most hidden / cover-up), tool is this Marius Milner's brand can be downloaded free at www. netstumbler. com .
No comments:
Post a Comment