| Both sides previous revisionPrevious revisionNext revision | Previous revision |
| quotes [2011/03/22 23:49] – quote by tefx n3cre0 | quotes [2019/04/14 22:47] (current) – quote from only mister_x |
|---|
| [23:19] <Tefx > WiFiHelper, i think you a bot but i shal give that a try thanks | [23:19] <Tefx > WiFiHelper, i think you a bot but i shal give that a try thanks |
| [23:19] <WiFiHelper > Tefx: Error: "i" is not a valid command. | [23:19] <WiFiHelper > Tefx: Error: "i" is not a valid command. |
| | |
| | Quote from SniperXP: |
| | <SniperXPX> I have the handshake packets for my WPA protected network. How would I go about bruteforcing the key? I can use disctionaries no problem but I cannot find anything about Bruteforcing |
| | <SniperXPX> dictionaries* |
| | <Zero_Chaos> !john |
| | <WiFiHelper> Zero_Chaos: "john" is (#1) http://tinyshell.be/aircrackng/forum/index.php?topic=176.0 or (#2) john --stdout --incremental | aircrack-ng -a 2 -w - <handshakes>.cap -e <essid> or (#3) http://www.openwall.com/john/ or (#4) http://openwall.info/wiki/john/markov |
| | <Zero_Chaos> you have 11,000 years right? |
| | <SniperXPX> I do not think the password is all that strong |
| | <SniperXPX> I do have access to a dual CPU xeon server |
| | <SniperXPX> I can leave that server running the job for weeks if I want to |
| | <Zero_Chaos> 11,000 years |
| | <hiexpo> lol |
| | <SniperXPX> I doubt the password is 64char |
| | <SniperXPX> It's most liekly 8-10 |
| | <SniperXPX> likely* |
| | <Zero_Chaos> LOL |
| | <Zero_Chaos> yeah, that is 11,000 years |
| | <SniperXPX> Seriously? |
| | <Zero_Chaos> yeah, please consult a calulator |
| | |
| | Quote from Zero_Chaos: |
| | <allfro> alright.. brb |
| | <allfro> build complete |
| | <allfro> patch applied |
| | <Zero_Chaos> hopefully in the opposite order... |
| | |
| | Quote from maslen: |
| | <haxwithdroid> I'd like to propose a new code style standard. COK: cat on keyboard. |
| | <maslen> Why not just call it perl ? |
| | <jeffree> damn |
| | <haxwithdroid> cok can be applied to any language |
| | <maslen> Yes. And then they'll all look like PERL |
| | |
| | Quote from only: |
| | <only> hey folks, can I set an Alfa USB wifi into monitor mode on macOS? |
| | <only> I have installed the drivers and see it as `en6` |
| | <only> or do I absolutely need a Linux VM? |
| | <Mister_X> only, you can capture with the internal card with wireshark |
| | <Mister_X> there is no injection |
| | <Mister_X> you can't use another card AFAIK |
| | <Mister_X> if you want to use that USB card, you'll either need to boot into a live linux (or installed on your mac) or a VM |
| | ... |
| | <only> Mister_X: so absolutely no workaround to this? :\ |
| | <Fishman> only: osx drivers are all closed source. expect to never have monitor mode on them. |
| | <Mister_X> only, yes, write a driver for it |
| | <only> well, that's what I was thinking.. surely someone thought about running rtl8812au natively in os x |
| | <Fishman> only: basically, no. |
| | ... |
| | # A few hours later: |
| | <only> no, I mean, how do I access the interfrace from within the linux vm? |
| | <only> on mac os |
| | <only> hey folks, has anyone used an external wifi adapter in monitor mode on a Mac? |
| | <Zero_Chaos> only: still not possible. no one fixed it for you in the last 3 hours |
| | <only> Zero_Chaos: fair enough |
| | * only has quit (Quit: Leaving...) |