Giftmonkey

Hey, Check out this new site They give away free high end Laptops, Video Game Consoles, iPods, Plasma TVs, and they even have GPS Navigation Systems http://www.GiftMonkey.com/?s=65972 Follow this steps carefully 1. Select the free gift of your choice and click on "getitfree" you will be directed to a new page 2. Here fill your email id and password and select the country and tick the box to accept user agreement and click on "continue to step2" 3. Goto "complete offer" page, and complete any one offer by clicking "complete this offer" you will be directed to new page register yourself in that site and come back to "complete offer" page, and click on "i completed this offer" tab. 4. Now goto "Account Status" page and refer your friends to get your free gift

Bidvertiser

Hi, I have just signed with a company that allows me to run text-ads on my website and they pay me each time someone clicks on the ad. The best thing is that they pay me via PayPal with a minimum of only $10. The company is called BidVertiser, here is the link to use: http://www.bidvertiser.com/bdv/bidvertiser/bdv_ref.dbm?Affiliate_ID=25&Ref_Option=pub&Ref_PID=184366

Bidvertiser

Oct 5, 2008

Wireless Hacking Live CD


Live Cd For Wireless Hacking, Also Used By The Fbi
This version is for all systems except systems with the Intel B/G wireless cards (IPW2200).
- Live CD with all the tools you need to hack a WLAN / wireless Access point -
Linux Live-CD - OS runs from CD - 635 mb - .iso

WEP Hacking - The Next Generation

WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.
Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of �strong� encryption while a 128 bit key has 104. The IV is placed in encrypted frame�s header, and is transmitted in plain text.
Traditionally, crac*ing WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packets—a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP crac*ing program such as Aircrac* would be used to find the WEP key.
Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, �It doesn�t matter if you use 128 bit WEP keys, you are vulnerable!�
WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products.
WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.
Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long.
A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of �strong� encryption while a 128 bit key has 104.
The IV is placed in encrypted frame�s header, and is transmitted in plain text.
Traditionally, cracking WEP keys has been a slow and boring process.
An attacker would have to capture hundreds of thousands or millions of packets a process that could take hours or even days, depending on the volume of traffic passing over the wireless network.
After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key.
Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared.
This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours.
Basic Directions:

1)Boot from cd
2)get the wep key
3)write it down
4)reboot into windows
5)connect using wep key.

Use Hjsplit to join...

CODE
http://rapidshare.com/files/84258913/Live_CD_-_Wireless_hacking.rar.001
http://rapidshare.com/files/84259380/Live_CD_-_Wireless_hacking.rar.002
http://rapidshare.com/files/84258950/Live_CD_-_Wireless_hacking.rar.003
http://rapidshare.com/files/84258969/Live_CD_-_Wireless_hacking.rar.004
http://rapidshare.com/files/84258930/Live_CD_-_Wireless_hacking.rar.005
http://rapidshare.com/files/84259874/Live_CD_-_Wireless_hacking.rar.006
http://rapidshare.com/files/84258869/Live_CD_-_Wireless_hacking.rar.007

No comments: