Results 1 to 6 of 6

Threaded View

  1. #1
    schokk21's Avatar
    Join Date
    Oct 2008
    Gender
    male
    Location
    Germany
    Posts
    399
    Reputation
    11
    Thanks
    113
    My Mood
    Hot

    FBI WLan Hacking System

    Hack a WLAN / Wireless Access Point




    Live Cd For Wireless Hacking, Also Used By The Fbi
    This version is for all systems except systems with the Intel B/G wireless cards (IPW2200).
    - Live CD with all the tools you need to hack a WLAN / wireless Access point -
    Linux Live-CD - OS runs from CD - 635 mb - .iso
    - also used by the FBI …

    WEP Hacking - The Next Generation

    WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.
    Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of “strong” encryption while a 128 bit key has 104. The IV is placed in encrypted frame’s header, and is transmitted in plain text.
    Traditionally, crac*ing WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packetsā€”a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP crac*ing program such as Aircrac* would be used to find the WEP key.
    Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, “It doesn’t matter if you use 128 bit WEP keys, you are vulnerable!”
    WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products.
    WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.
    Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long.
    A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of “strong” encryption while a 128 bit key has 104.
    The IV is placed in encrypted frame’s header, and is transmitted in plain text.
    Traditionally, cracking WEP keys has been a slow and boring process.
    An attacker would have to capture hundreds of thousands or millions of packets a process that could take hours or even days, depending on the volume of traffic passing over the wireless network.
    After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key.
    Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared.
    This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours.
    Basic Directions:

    1)Boot from cd
    2)get the wep key
    3)write it down
    4)reboot into windows
    5)connect using wep key.
    DOWNLOAD:
    ww.**********.com
    **********: Easy Filehosting
    **********: Easy Filehosting
    **********: Easy Filehosting
    **********: Easy Filehosting
    **********: Easy Filehosting
    **********: Easy Filehosting
    **********: Easy Filehosting

    ww.*******.in
    ******* Serious Filehosting - *******
    ******* Serious Filehosting - *******
    ******* Serious Filehosting - *******
    ******* Serious Filehosting - *******
    ******* Serious Filehosting - *******
    ******* Serious Filehosting - *******
    ******* Serious Filehosting - *******

    ww.************.com
    Deposit Files
    Deposit Files
    Deposit Files
    Deposit Files
    Deposit Files
    Deposit Files
    Deposit Files

    ww.***********.com
    LCD.Wireless.pm.part1.rar -- ***********.com - free file hosting --
    LCD.Wireless.pm.part2.rar -- ***********.com - free file hosting --
    LCD.Wireless.pm.part3.rar -- ***********.com - free file hosting --
    LCD.Wireless.pm.part4.rar -- ***********.com - free file hosting --
    LCD.Wireless.pm.part5.rar -- ***********.com - free file hosting --
    LCD.Wireless.pm.part6.rar -- ***********.com - free file hosting --
    LCD.Wireless.pm.part7.rar -- ***********.com - free file hosting --

    ww.megaupload.com
    MEGAUPLOAD - The leading online storage and file delivery service
    MEGAUPLOAD - The leading online storage and file delivery service
    MEGAUPLOAD - The leading online storage and file delivery service
    part4 wont upload it too lazy
    Part5 Wont upload it too lazy
    MEGAUPLOAD - The leading online storage and file delivery service
    MEGAUPLOAD - The leading online storage and file delivery service

    WITH JSPLIT U JOIN THE PARRTS TOGETHER. search in google for download.
    Last edited by schokk21; 11-17-2008 at 01:12 PM.

Similar Threads

  1. OMG DO NOT HACK!!!! new hack system = BAN
    By Cocaine Gotti in forum Combat Arms Discussions
    Replies: 27
    Last Post: 08-05-2011, 10:18 PM
  2. [Info] DO NOT HACK!!!! new hack system = BAN
    By Lonely Tedy Bear in forum Combat Arms Discussions
    Replies: 46
    Last Post: 08-03-2011, 09:55 PM
  3. Holy Sh!t - New crossfire anti-hack system
    By CrossRaiders in forum CrossFire Discussions
    Replies: 64
    Last Post: 10-09-2010, 08:00 AM
  4. Question!!! Abaut new anti hack system!
    By combats in forum Combat Arms Help
    Replies: 6
    Last Post: 05-04-2010, 05:45 PM
  5. Hacks / System Update
    By Dave84311 in forum Hack/Release News
    Replies: 17
    Last Post: 03-24-2009, 01:03 AM

Tags for this Thread