Welcome to Laser Pointer Forums - discuss green laser pointers, blue laser pointers, and all types of lasers

LPF Donation via Stripe | LPF Donation - Other Methods

Links below open in new window

ArcticMyst Security by Avery

Packet Injecting WIFI usb adapter - aircrack-ng

Joined
Jun 7, 2007
Messages
1,771
Points
0
I bought a looooong range usb wifi adapter that should be able to boost my current signal from 2 bars to full 100%. The router is in a few rooms over... but not only that, the signal is so powerful I should be able to pick up wifi from houses and neighbors far away.

I found it funny that call it a 1000mW network adapter:

Amazon.com: Alfa 1000mW 1W 802.11b/g USB Wireless WiFi Network Adapter With Original Alfa Screw-On Swivel 9dBi Rubber Antenna: Electronics

As one review had stated, he was put in a hotel with wifi, but in his room he got 0 to 1 bars (this has happened to me way too many times), but with this adapter he got full bars, now that's cool!!

Not only that, but it supports packet injection. This means I can crack other WEP & WPA networks (WPA2 is pretty much out of the question).

Anyone else ever used Linux and aircrack-ng to acquire other wifi passwords...for...educational purposes of course..:whistle:
 
Last edited:





Joined
Dec 27, 2009
Messages
1,321
Points
0
Very good choice for an adapter. Try a directional antenna. :D IMO never buy an adapter without RP-SMA or otherwise removable antenna.

I use Linux solely. Kismet drones for fun to keep an eye on the air. Aircrack on my networks. Injection will broadcast your attack at 1000mW, If you popped up on my drones I would go out & track you. I can see you but you can't see me or anyone else running kismet.
Of course you can crack WEP w/o injection if there is decent activity on the network & you can stay located within range for enough time.

@rangedunits Always use WPA2 only. Long password with numbers & symbols.
 
Last edited:

HIMNL9

0
Joined
May 26, 2009
Messages
5,318
Points
0
Well, have you considered that, for have a long range wifi connection, you don't need just a high power transmitter, but need that also the other point have it ?

I mean, what's the purpose to have a transmitting section that can cover 1Km, if after, you can't receive the signal from the other apparate, that still have a 40 / 50 meters range ?

;) :D
 
Joined
Dec 27, 2009
Messages
1,321
Points
0
Longer range receiving (of lower power transmitters) is where a directional antenna helps. That particular adapter has pretty good receive sensitivity for b/g networks.

Anyone run openwrt / dd-wrt routers, kismet, aircrack, anything? Hell even just wardriving (wifi searching) with windows?
MDK? :evil:
 
Last edited:
Joined
May 31, 2009
Messages
3,239
Points
63
Yep, I'm studing computer networking and wireless transmittions at university.... Download the VMware version of backtrack 4... been playing around with it for a while now! I have successfully hacked my own network within 1 min... very cool stuff
 

HIMNL9

0
Joined
May 26, 2009
Messages
5,318
Points
0
I will bet whatever you want that, with my actual safety settings, you can NEVER crack the wireless network of my netgear router, regardless the program you use and the time you try.

..... it's phisically turned off ..... :p

:crackup:
 
Joined
May 31, 2009
Messages
3,239
Points
63
Well.... with a WPA2 encryption it would take ~19 years to brute force the combination... unless it is a dictionary entry... in other case, A WPA handshake must be captured in order to find the password which still takes time... In the same amount of time, you could drive to the nearest library and get free internet there...

There really is no point hacking wireless for an internet connection IMO...
 

HIMNL9

0
Joined
May 26, 2009
Messages
5,318
Points
0
^ bobhaha, i think you have not read all my post ..... especially, the small grey characters .....

..... it was a joke :p :D
 
Joined
Jan 2, 2008
Messages
1,513
Points
83
Although WPA2 is crackable. It's still your best bet, IMHO.

I have WPA2 on my wifi side of things 13 character alpha numeric. Hard to crack.
I'm working on setting up a system to test strength of it. And hack my own system to improve it.

You might also consider the following.

A good sniffer - (pirni pro for the iphone works but isn't great, lots of PC/Mac/Linux apps)

I like KisMac for mac.

BUT ONLY FOR using legal access points or checking your own system.

I used to hack/crack but that was before it was illegal. (late 70's early 80's) Won't do it now though.

Buy your wifi or find a LEGAL access point. With all the unprotected systems and wi-fi hot spots out there you should NEVER need to crack a system to get a connection. With a 1 watt transciever you should be able to pick up lots of hot spots unless you are living in the sticks.

I have 4 neighbors with wifi I can pick up on a standard Airport card. Three of them are unprotected. Plus with a little stronger unit I can pick up Starbucks and half a dozen other hot spots.

I also have the option of lowering the power output of both of my units WHICH I DO, to prevent other people from stealing mine. So I'm one of those people who does care if people leech off my bandwidth. Most unprotected networks don't care.

It's your neck!
 
Joined
Jan 11, 2008
Messages
671
Points
0
WPA2 FTW! Like others have said, WPA2 is still crackable, but it's much harder if the password is long and contains other symbols (unless you have a supercomputer ;))
 
Joined
Apr 28, 2009
Messages
2,416
Points
63
You can also use a "one time pad", utilizing true random numbers to encrypt. Maybe gather those numbers with a low-grade radioactive source and install them into a large database. I used to work with this type of streaming encryption. If you lose your pad however, the data is lost for eternity. ;-)
 

HIMNL9

0
Joined
May 26, 2009
Messages
5,318
Points
0
A better system can be a module that use asymetric keys (public and private, like PGP), but, opposite than PGP, that make a DOUBLE sequential encryption with 2 public keys, and ofcourse the opposite with the private keys .

I know that, with parallel machines, also a PGP encryption can be decrypted, but consider this: you know that the decryption worked, when you can read the message ..... now, if with 2 passes encryption you get randomly characters strings looking both with the wrong and right key, from the first step, how you can know when you got the right one from the first step, to decrypt with the second ?

Brute forcing each trial with all the combinations of the second one ? ..... LOL, with (128^4096)^4096 possibilities, i think you don't have also just the space for write down the resulting number of trials ..... and this can be done more than one time, if needed (((128^4096)^4096)^4096)^4096 ..... :p :D
 
Joined
May 31, 2009
Messages
3,239
Points
63
A better system can be a module that use asymetric keys (public and private, like PGP), but, opposite than PGP, that make a DOUBLE sequential encryption with 2 public keys, and ofcourse the opposite with the private keys .

I know that, with parallel machines, also a PGP encryption can be decrypted, but consider this: you know that the decryption worked, when you can read the message ..... now, if with 2 passes encryption you get randomly characters strings looking both with the wrong and right key, from the first step, how you can know when you got the right one from the first step, to decrypt with the second ?

Brute forcing each trial with all the combinations of the second one ? ..... LOL, with (128^4096)^4096 possibilities, i think you don't have also just the space for write down the resulting number of trials ..... and this can be done more than one time, if needed (((128^4096)^4096)^4096)^4096 ..... :p :D

Pffftttt.... I can decrypt that in my head :D:p
 





Top