An unlucky semi-finished product cracking wireless password

Source: Internet
Author: User
Tags strong password

In other words, in Beijing, the dormitory's network connection to the Forum could not be reached, so we had to find a way to break through a few wireless channels and download things. Hey hey, by the way, we can also use dsploit to scan the password. I am a good guy, don't do bad things, hey .... It is said that the neighbors are computer-related, and they do not know whether there are regular customers. The Tenda vro has recently become more involved. It is easy to bypass cookies, and no background password is needed. So let's go one by one. First, find a bunch of wireless cables. For example, find a tengda vro and use the dictionary I keep to break out the password. Of course, the dictionary will be shared with you and cannot be swallowed up independently. The tools used are described as follows: (1) CDLINUX (2) a very reliable dictionary (3) ftp tools under CDLINUX (or how to reverse the dictionary) the first step is to enable the ftp service and copy the dictionary to it. Remember


Select your IP address and click OK.
Note: Do not click OK. Click OK to close the ftp account and password. Anonymous Users can write the directory, the default permission of the/tmp directory is 1777.

If you click OK, you cannot enter it here.
This is my reliable dictionary. I put it under the/tmp directory, and the next step is to go to the cracking Step 1. Scan
1. Start 2. Be patient Then, click OK. 1. Select the dictionary. Click ok1.
Then the password is cracked.

In fact, it is not a weak password, and of course it is not a strong password, hey. Try connecting, but failed. Only one connection can be connected, but the connection is connected, but the Internet cannot be accessed, because the Internet environment here requires identity authentication, enter the Internet access account and password on the webpage. Other APS cannot be connected. I suspect that some security policies have been implemented, but I don't know where to modify them. I wonder if I have bound the mac address or filtered the mac address, then I used macchanger to change the mac address of the wireless network adapter. Use ifconfig wlan0 down to down the interface, and then use the built-in mac tool to modify macchanger-m xx: xx wlan0 now the mac of the wireless network card of the virtual machine has been changed, so the virtual machine should be able to connect, but still prompts a wrong password. I tried to try again several times, but the password is the same, because I cannot connect to the wireless network, I cannot continue to use dsploit to capture the password. Since we can't continue to penetrate, let's just crack a few more passwords, and there is also a wep-encrypted password. It is said that this encryption is very fragile, but because the current wireless routers are all encrypted using WPA2, therefore, WEP encryption starts to fall short, but in actual life, WEP encryption still exists. In windows xp, if you want to share the network, the encryption method can only be WEP, so the existing wep encryption is usually xp, so it can still be used. Since the above content cannot continue to penetrate, we can only write down and crack wep. Here, we have a wep encrypted file. We do not need to run the dictionary during wep cracking, but it takes a long time, in fact, we can see from the figure below
Step 1 click Start, and wait for IVS to reach around 2w-3w (this is an online experience and I don't know if it is correct) according to Backtrack5, it requires 5000 ivs to crack the password. However, when I was using CDLINUX, my ivs started to crack more.
After the cracking is completed, a long box is displayed, and the password is actually such a bad password ...... Conclusion: in fact, the pin code is a good method to crack wpa2 encryption, but this method has several disadvantages, so I have never succeeded in using the pin. Disadvantage 1: A waste of time. disadvantage 2: unstable pin code cracking speed. disadvantage 3: easy to kill pin code cracking. disadvantage 4: limited use of pin code, this method can be used only when wps is enabled. Therefore, I think it is more reliable to capture packets and crack packets. Generally, weak passwords can be found.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.