background preloader

How to Crack a Wi-Fi Network's WEP Password with BackTrack

How to Crack a Wi-Fi Network's WEP Password with BackTrack
Kinja is in read-only mode. We are working to restore service. I did check the publication date on this piece, because - no sarcasm intended - I thought something bubbled up from 2005. WEP cracking can be done much more easily than this, even. Kismet and Kismac both crack WEP with less effort. The point is that WEP, since about 2003, has been useful only as a no-trespassing sign. Now WPA, despite some reports of cracks, is still considered uncracked - there's one exploit that requires some careful timing, doesn't reveal the key, and only works on very short packets. Flagged @Glenn Fleishman: Yep re: this bubbling up from 2005—like I said, this is not news. I like the description of WEP as a "no trespassing" sign more than anything else.

http://lifehacker.com/5305094/how-to-crack-a-wi-fi-networks-wep-password-with-backtrack

Related:  Network/Security

Wireless Tips – Does Your Wireless Router Keep Disconnecting or Dropping the Connection? I’ve had a Netgear wireless router for about a year now and it’s been pretty good until a couple of weeks back all of sudden my wireless connection kept dropping or I could not connect to the router unless I restarted the router! It was a royal pain in the butt, but because I’m lazy I didn’t get around to fixing it earlier! If you’re in the same situation, here’s what you can do to fix the problem! The issue is usually caused by one of two things: the driver for your wireless card or the firmware version on your router (basically the driver for the router). I have found that unless you’re using a really old wireless router, it’s more than likely an old driver for your wireless card that is the culprit. So you have to update the wireless card.

CleanPrint Browser Tool What is CleanPrint® CleanPrint® is an economically and ecologically friendly print tool that saves you paper, ink, and money while making your output look great. CleanPrint is activated by clicking the CleanPrint Browser Tool instead of the print button next to an article on a website. Chapter 1. Hacker Slang and Hacker Culture This document is a collection of slang terms used by various subcultures of computer hackers. Though some technical material is included for background and flavor, it is not a technical dictionary; what we describe here is the language hackers use among themselves for fun, social communication, and technical debate. The ‘hacker culture’ is actually a loosely networked collection of subcultures that is nevertheless conscious of some important shared experiences, shared roots, and shared values. It has its own myths, heroes, villains, folk epics, in-jokes, taboos, and dreams. Because hackers as a group are particularly creative people who define themselves partly by rejection of ‘normal’ values and working habits, it has unusually rich and conscious traditions for an intentional culture less than 50 years old. As usual with slang, the special vocabulary of hackers helps hold places in the community and expresses shared values and experiences.

6 Ways to Keep Your Search Secrets Safe It’s sad to say but many recent events (Google Search Subpoena, AOL’s BIG Mistake, etc) make it very clear that online your privates are not private anymore. I mean, do you really want people to know your secret love of fairies? Or worse? As disturbing, funny, and nutty some of those searches are one thing is pretty clear — people ran them in private. Network Monitoring Tools Les Cottrell, SLAC. Last Update: December 14, 2015 ESnet | ESCC | PinGER Internet monitoring | Tutorial This is a list of tools used for Network (both LAN and WAN) Monitoring tools and where to find out more about them. The audience is mainly network administrators. Do the Two Step to Protect Your Google Drive, Dropbox, and Box Files Cloud storage of files is one of my favorite aspects of the modern Internet. Cloud storage services make it easy to access all of my important files from any computer and most mobile devices. And for students cloud storage eliminates the I forgot my flashdrive excuse for not having an assignment ready for class. The potential problem with cloud storage, and any other online service for that matter, is having your account compromised. One way to make it more difficult for your account to be compromised is to enable two-step authentication.

Security Development Conference 2012 With the rapid evolution of cloud computing, mobile devices and other technologies, user data has become increasingly dependent on the security of software. The amount and types of data available for collection, analysis and dissemination have increased the importance of reducing the risk associated with protecting data. The second annual Security Development Conference will bring together some of the best and brightest information security professionals from a variety of industries.

Pwnie Express Now faster, lighter, and thinner than ever, the Pwn Pad 2014 is a commercial grade penetration testing tablet providing unprecedented ease of use in evaluating wired and wireless networks. The sleek form factor is an ideal choice when on the road or conducting a company or agency walk-through. This high-speed, lightweight device, featuring extended battery life and the world’s sharpest 7” tablet screen, offers pentesters an alternative never known before. Core Features:

Anonymous BitTorrent Services Simple download & install No records of usage stored 256-bit AES encryption Unlimited download speeds, 10Gbit servers VPN includes OpenVPN & PPTP Servers in Canada, Europe and Asia Secure Your Wireless Router In The Short Term By Assigning It An Aggressive Name As more devices ship with wireless networking capabilities, it becomes increasingly important to have routers that are capable of handling connections from hardware such as tablets, laptops and mobile phones. The problem is that many routers still in use are perfectly good pieces of hardware, except for one drawback – they don’t support Wireless-N or offer advanced encryption such as WPA. With the threat of drive-by Wi-Fi theft and the risk of secure data being transferred over a non-secure connection, wireless routers without the most current security options can be temporarily shored up with just a bit of imagination. Meanwhile, there are ways in which you can get hold of modern routers for free and connect to them using low-cost USB devices. Secure Your Wireless Router with Its Name According to figures published in October 2011, Windows XP still has a respectable market share as the operating system on around 33% of all computers connected to the web.

Chrome - Click&Clean ✩ Rate 5 Stars The #1 Private Data Cleaner for Chrome Web Browser Click&Clean is a free, fast and easy-to-use extension for Chrome that can be used as a powerful private data Cleaner. The Hacker Manifesto by +++The Mentor+++ Written January 8, 1986 Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"... Damn kids.

Related:  Computer Stuff in GeneralIT Security