ok so how do i make that source code into something i can use on xp? compile that code plz!!!
Name:
Anonymous2011-12-30 21:03
how do i become 1337 h4x0r?
i already know alot of programming, i have programmed a website in html, well actually i did it in word and saved as html.
tl;dr how to hack computa?
Name:
Anonymous2011-12-30 21:33
You can find the free, open source version of Reaver at Google Code
If you are interested in purchasing the commercial version of Reaver please contact us. Currently available only to U.S. federal, state, and local government agencies.
nice. also van gets it first
Name:
Anonymous2011-12-30 22:23
I can't be bothered to read all the details. Does it only affect WPA, or WPA2 as well?
>>7
>This vulnerability exposes a side-channel attack against Wi-Fi Protected Access (WPA) versions 1 and 2 allowing the extraction of the Pre-Shared Key (PSK) used to secure the network.
>>17
Most have a 4 or 8 digit "PIN", which is trivial to bruteforce. The only wireless device I own is a mouse.
Name:
!L33tUKZj5I2012-04-05 12:18
Only just got round to trying this. Not needed it yet (still don't).
It seems that almost all the AP's around here have some kind of rate limiting thing where if you hammer it with pins then it locks you out after a few tries, for five minutes at a time. However, couple of days in and I'm at over 20% done...this is a vast improvement over the four years it would have taken me to bruteforce a WPA key on my main machine that was ten characters long, and all uppercase alpha-numeric (which is what SKY broadband wireless passwords are according to forums).
>>23
Soča or Isonzo River in Slovenia and Italy
Soca music, a West Indian music genre originating in Trinidad and Tobago
Soca, a village in Banloc Commune, Timiş County, Romania
L33tUK you're a fucking chav! And so is Lily Allen! Fuck you!!!
Name:
!L33tUKZj5I2012-04-05 23:32
One thing I've noticed about this exploit, is it seems to hang every now and then. Usually after a few hours use. I'm using the 1.4 version (latest).
I was going to leave my laptop doing this while i went away for the weekend (off down south for something for a few days, could have survived with just the web on my phone) but if it's just going to hang, doesn't seem like there's much point. Thankfully it saves the session when you exit for every AP you try, so I can stop it and come back to it.
Although having said that, this connection is from my phone tethered to my laptop. My desktop in the front room is hooked up to a neighbour's WEP connection that I have to use a cantenna to get. When I crack this, I'll have broadband throughout the flat again. Gonna torrent the SHIT out of it.
Name:
Anonymous2012-04-06 4:45
>>32
If you were my neighbour I'd have filled your hard-drive with all manner of illegal files by now. And I'd be laughing my ass off as the party van took you away.
>>15 Am I really going to have to go full-retard and use end-to-end encryption absolutely everywhere.
Yes, you should be doing so regardless. Also, this is why I still use ethernet for (most of) my networking and Internet needs. Putting your faith into wireless being secure is like putting your faith into Jesus™ making sure your life is secure.
>>21 The only wireless device I own is a mouse.
I have one, but it's strictly for use as a spare, or when I'm not using the laptop in the house. Otherwise, everything is with wires. Complete technological isolationism FTW.
Name:
Anonymous2012-04-06 8:14
>>34
You're right - maybe I wouldn't be laughing. Actually I think I might feel a teensy weensy bit bad for you if the coppers arrested you under false charges. But no one cares about you, so they wouldn't be missing much.