قراصــنه العــرب

عزيزى الزائر ليس لديك حساب فى منتدانا لذا يجب عليك التسجيل معنا ولو لديك حساب مفعل لدينا نرجو منك الدخول

انضم إلى المنتدى ، فالأمر سريع وسهل

قراصــنه العــرب

عزيزى الزائر ليس لديك حساب فى منتدانا لذا يجب عليك التسجيل معنا ولو لديك حساب مفعل لدينا نرجو منك الدخول

قراصــنه العــرب

هل تريد التفاعل مع هذه المساهمة؟ كل ما عليك هو إنشاء حساب جديد ببضع خطوات أو تسجيل الدخول للمتابعة.
قراصــنه العــرب

® H.A.C.K.R.S ®


    توزيعة لينكس احترافية في اختراق الوايرلس

    mody
    mody
    A D M I N
    A D M I N


    ذكر
    عدد الرسائل : 6571
    العمر : 36
    البلد : alex
    العمل/الترفيه : computer
    المزاج : عصبى جدا
    الاوسمه : توزيعة لينكس احترافية في اختراق الوايرلس  W4
      : توزيعة لينكس احترافية في اختراق الوايرلس  15781612
    ناديك المفضل : توزيعة لينكس احترافية في اختراق الوايرلس  Ahly_l10
    السٌّمعَة : 75
    نقاط النشاط : 114131236
    تاريخ التسجيل : 13/02/2008

    mody5 توزيعة لينكس احترافية في اختراق الوايرلس

    مُساهمة من طرف mody السبت يوليو 10, 2010 8:51 pm

    السلم عليكم
    بنما كنت أجول في المنتديات الغربية وجدت ها التوزيعة الجميلة وظيفتها هي اختراق الشبكة و الحصول على الباسوورد

    توزيعة لينكس احترافية في اختراق الوايرلس  289c46a

    Wireless Hacking Live | ISO | 739MB

    كود:
    This version used by the F.B.I. and is for all systems except systems with the Intel B/G wireless cards (IPW2200).
    Live CD with all the tools you need to h@ck a WLAN / wireless Access point Linux (Live CD) and OS (runs from CD).

    WEP H@cking - The Next Generation

    WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.

    Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of strong encryption while a 128 bit key has 104. The IV is placed in encrypted frames header, and is transmitted in plain text.

    Traditionally, cr@cking WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packets—a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP cr@cking program such as Aircr@ck would be used to find the WEP key.
    Fast-forward to last summer, when the first of the latest generation of WEP cr@cking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, It does'nt matter if you use 128 bit WEP keys, you are vulnerable!


    WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products.

    WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.

    Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long.
    A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of strong encryption while a 128 bit key has 104.

    The IV is placed in encrypted frames header, and is transmitted in plain text.
    Traditionally, cr@cking WEP keys has been a slow and boring process.
    An attacker would have to capture hundreds of thousands or millions of packets a process that could take hours or even days, depending on the volume of traffic passing over the wireless network.

    After enough packets were captured, a WEP cr@cking program such as Aircr@ck would be used to find the WEP key.
    Fast-forward to last summer, when the first of the latest generation of WEP cr@cking tools appeared.

    This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours.

    Basic Directions:
    1) Boot from cd
    2) Get the wep key
    3) Write it down
    4) Reboot into windows
    5) Connect using wep key.







    التحميل








      الوقت/التاريخ الآن هو الجمعة مارس 29, 2024 9:52 am