October 30, 2011

2Wire WPA Brute Force

Hardware Selection

Install BackTrack Linux

For me it was best to install BackTrack as a partition on the hard drive, rather than running from USB. The problem with USB for me was I could not get BackTrack 5 to work with persistence on USB.

Capture WPA Handshake

After handshake has been captured it will show on the terminal



6. The captured handshake will be stored in 2WIRE422-01.cap

Crack

Links

backtrack-linux.org/wiki/index.php/CUDA_On_BackTrack
forum.aircrack-ng.org/index.php?topic=11633.0
lifeofaprogrammergeek.blogspot.com/2008/05/cuda-development-in-ubuntu.html
singhvishwajeet.com/2009/09/16/solving-the-build-error-python-h-no-such-file-or-directory-on-ubuntu
smallnetbuilder.com/wireless/wireless-howto/30278-how-to-crack-wpa--wpa2
ubuntuforums.org/showthread.php?t=394847

2 comments:

  1. This is a very specific topic on how to do one thing. I want am already on the network, but I want to get into the Management Console to change router settings. (Such as limits on what time my "Restricted Internet Usage Times" will be.) Is there a way to get around that?

    Of course I have to be smart about it, such as if it was set to turn off at midnight, I change it to like 1AM, then when I'm done on the internet, I change it back to Midnight. I just need to get into the basic 192.168.1.1 page.

    ReplyDelete
  2. Well if they are dumb enough they could have left the default password on the router login, IE
    http://www.phenoelit-us.org/dpl/dpl.html.
    Otherwise you could try something like FireForce
    http://www.ethicalhackingguide.net/2011/08/web-form-password-brute-force-with.html

    ReplyDelete