RT @markbrown crack da wep

Installation of the MATHWRATH brand created by cracking found WEP and WPA protected wireless signals, gaining access to the transmitting routers via bruteforcing dictionary attacks, and then altering their SSID settings. The displayed order of the two affected SSIDs in the Airport menu was achieved by repeatedly scanning for wifi signals until the desired outcome resulted.

:      :      :      :


:      :      :      :

  1. RT @markbrown crack da wep


  1. Posted ██████████ at 2:03 am | Permalink

    Very nice, as an aside I don’t know much about wireless standards, but which protection was easier to brute?

  2. Posted ██████████ at 8:41 am | Permalink

    Devilish debut.

  3. Posted ██████████ at 12:29 pm | Permalink

    @Robert Lorayn

    u dont usually brute force WEP passes you can just run a script like airoscript that collects Initialization Vectors from the targets network traffic then decrypts that data, then out pops a key.
    here’s a good guide: http://www.tomsguide.com/us/how-to-crack-wep,review-459.html

    WPA passes can usually be taken out with a brutefrce dictionary attack because they’re mostly simple ascii . the WPA i cracked ended up being “password” so it solved it in like 5 seconds

Your email is never published nor shared. Required fields are marked *