Both sides previous revisionPrevious revisionNext revision | Previous revision |
quotes [2011/03/22 23:49] – quote by tefx n3cre0 | quotes [2019/04/14 22:47] (current) – quote from only mister_x |
---|
[23:19] <Tefx > WiFiHelper, i think you a bot but i shal give that a try thanks | [23:19] <Tefx > WiFiHelper, i think you a bot but i shal give that a try thanks |
[23:19] <WiFiHelper > Tefx: Error: "i" is not a valid command. | [23:19] <WiFiHelper > Tefx: Error: "i" is not a valid command. |
| |
| Quote from SniperXP: |
| <SniperXPX> I have the handshake packets for my WPA protected network. How would I go about bruteforcing the key? I can use disctionaries no problem but I cannot find anything about Bruteforcing |
| <SniperXPX> dictionaries* |
| <Zero_Chaos> !john |
| <WiFiHelper> Zero_Chaos: "john" is (#1) http://tinyshell.be/aircrackng/forum/index.php?topic=176.0 or (#2) john --stdout --incremental | aircrack-ng -a 2 -w - <handshakes>.cap -e <essid> or (#3) http://www.openwall.com/john/ or (#4) http://openwall.info/wiki/john/markov |
| <Zero_Chaos> you have 11,000 years right? |
| <SniperXPX> I do not think the password is all that strong |
| <SniperXPX> I do have access to a dual CPU xeon server |
| <SniperXPX> I can leave that server running the job for weeks if I want to |
| <Zero_Chaos> 11,000 years |
| <hiexpo> lol |
| <SniperXPX> I doubt the password is 64char |
| <SniperXPX> It's most liekly 8-10 |
| <SniperXPX> likely* |
| <Zero_Chaos> LOL |
| <Zero_Chaos> yeah, that is 11,000 years |
| <SniperXPX> Seriously? |
| <Zero_Chaos> yeah, please consult a calulator |
| |
| Quote from Zero_Chaos: |
| <allfro> alright.. brb |
| <allfro> build complete |
| <allfro> patch applied |
| <Zero_Chaos> hopefully in the opposite order... |
| |
| Quote from maslen: |
| <haxwithdroid> I'd like to propose a new code style standard. COK: cat on keyboard. |
| <maslen> Why not just call it perl ? |
| <jeffree> damn |
| <haxwithdroid> cok can be applied to any language |
| <maslen> Yes. And then they'll all look like PERL |
| |
| Quote from only: |
| <only> hey folks, can I set an Alfa USB wifi into monitor mode on macOS? |
| <only> I have installed the drivers and see it as `en6` |
| <only> or do I absolutely need a Linux VM? |
| <Mister_X> only, you can capture with the internal card with wireshark |
| <Mister_X> there is no injection |
| <Mister_X> you can't use another card AFAIK |
| <Mister_X> if you want to use that USB card, you'll either need to boot into a live linux (or installed on your mac) or a VM |
| ... |
| <only> Mister_X: so absolutely no workaround to this? :\ |
| <Fishman> only: osx drivers are all closed source. expect to never have monitor mode on them. |
| <Mister_X> only, yes, write a driver for it |
| <only> well, that's what I was thinking.. surely someone thought about running rtl8812au natively in os x |
| <Fishman> only: basically, no. |
| ... |
| # A few hours later: |
| <only> no, I mean, how do I access the interfrace from within the linux vm? |
| <only> on mac os |
| <only> hey folks, has anyone used an external wifi adapter in monitor mode on a Mac? |
| <Zero_Chaos> only: still not possible. no one fixed it for you in the last 3 hours |
| <only> Zero_Chaos: fair enough |
| * only has quit (Quit: Leaving...) |