Jun 17, 2025
Оfftopic Community
Оfftopic Community
Forums
New posts
Search forums
What's new
Featured content
New posts
New media
New media comments
New resources
New profile posts
Latest activity
Media
New media
New comments
Search media
Resources
Latest reviews
Search resources
Members
Current visitors
New profile posts
Search profile posts
Log in
Register
What's new
Search
Search
Search titles only
By:
New posts
Search forums
Menu
Log in
Register
Install the app
Install
Forums
FileSharing
File Sharing
Wireless H@cking Live (FBI Version)
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Message
<blockquote data-quote="satoony" data-source="post: 2366299" data-attributes="member: 815121"><p>Wireless H@cking Live (FBI Version) </p><p></p><p><img src="http://i027.radikal.ru/1003/5c/3e452c1d3901.jpg" alt="" class="fr-fic fr-dii fr-draggable " data-size="" style="" /></p><p></p><p>WEP Hacking ? The Next Generation</p><p></p><p></p><p>WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.</p><p></p><p>Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of strong encryption while a 128 bit key has 104. The IV is placed in encrypted frames header, and is transmitted in plain text.</p><p></p><p>Traditionally, cracking WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packets?a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key.</p><p></p><p>Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, It does?nt matter if you use 128 bit WEP keys, you are vulnerable!</p><p></p><p>WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products.</p><p></p><p>WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.</p><p></p><p>Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long.</p><p></p><p>A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of strong encryption while a 128 bit key has 104.</p><p></p><p>The IV is placed in encrypted frames header, and is transmitted in plain text.</p><p></p><p>Traditionally, cracking WEP keys has been a slow and boring process.</p><p></p><p>An attacker would have to capture hundreds of thousands or millions of packets a process that could take hours or even days, depending on the volume of traffic passing over the wireless network.</p><p></p><p>After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key.</p><p></p><p>Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared.</p><p></p><p>How to use?</p><p></p><p>1) Boot from cd</p><p>2) Get the wep key</p><p>3) Write it down</p><p>4) Reboot into windows</p><p>5) Connect using wep key.</p><p></p><p>DOWNLOAD:</p><p></p><p>[code]</p><p>http://hotfile.com/dl/64826137/3559b1c/Live_CD_-2010_-FBI_Tools.part1.rar.html</p><p>http://hotfile.com/dl/64826845/084d93e/Live_CD_-2010_-FBI_Tools.part2.rar.html</p><p>http://hotfile.com/dl/64826992/52610ec/Live_CD_-2010_-FBI_Tools.part3.rar.html</p><p>http://hotfile.com/dl/64827103/79cbc38/Live_CD_-2010_-FBI_Tools.part4.rar.html</p><p>http://hotfile.com/dl/64827252/c97b2cc/Live_CD_-2010_-FBI_Tools.part5.rar.html</p><p>http://hotfile.com/dl/64827478/fdd8f7e/Live_CD_-2010_-FBI_Tools.part6.rar.html</p><p>http://hotfile.com/dl/64827546/1ce2118/Live_CD_-2010_-FBI_Tools.part7.rar.html</p><p>[/code]</p><p></p><p>Pass: himzelf</p></blockquote><p></p>
[QUOTE="satoony, post: 2366299, member: 815121"] Wireless H@cking Live (FBI Version) [img]http://i027.radikal.ru/1003/5c/3e452c1d3901.jpg[/img] WEP Hacking ? The Next Generation WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver. Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of strong encryption while a 128 bit key has 104. The IV is placed in encrypted frames header, and is transmitted in plain text. Traditionally, cracking WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packets?a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key. Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, It does?nt matter if you use 128 bit WEP keys, you are vulnerable! WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver. Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of strong encryption while a 128 bit key has 104. The IV is placed in encrypted frames header, and is transmitted in plain text. Traditionally, cracking WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packets a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key. Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. How to use? 1) Boot from cd 2) Get the wep key 3) Write it down 4) Reboot into windows 5) Connect using wep key. DOWNLOAD: [code] http://hotfile.com/dl/64826137/3559b1c/Live_CD_-2010_-FBI_Tools.part1.rar.html http://hotfile.com/dl/64826845/084d93e/Live_CD_-2010_-FBI_Tools.part2.rar.html http://hotfile.com/dl/64826992/52610ec/Live_CD_-2010_-FBI_Tools.part3.rar.html http://hotfile.com/dl/64827103/79cbc38/Live_CD_-2010_-FBI_Tools.part4.rar.html http://hotfile.com/dl/64827252/c97b2cc/Live_CD_-2010_-FBI_Tools.part5.rar.html http://hotfile.com/dl/64827478/fdd8f7e/Live_CD_-2010_-FBI_Tools.part6.rar.html http://hotfile.com/dl/64827546/1ce2118/Live_CD_-2010_-FBI_Tools.part7.rar.html [/code] Pass: himzelf [/QUOTE]
Insert quotes…
Name
Verification
Please enable JavaScript to continue.
Loading…
Post reply
Top