Members
  • Total Members: 14197
  • Latest: Levine
Stats
  • Total Posts: 43432
  • Total Topics: 16527
  • Online today: 2999
  • Online ever: 51419
  • (01. January 2010., 10:27:49)
Users Online
Users: 2
Guests: 2999
Total: 3001









Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.codekids.ba:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: F3RL
« on: 21. March 2009., 10:36:00 »

My apology for late reply,

The easiest way to get those tools are to obtain a copy of BackTrack 3, (BackTrack 4 is on beta).
Which has more than 100 security assessment tools. However it requires basic/intermediate knowledge with UNIX shell - which I have not fully mastered it yet ;)

Here is the link: http://www.remote-exploit.org/backtrack.html
Posted by: jake2pointzero
« on: 21. March 2009., 00:51:30 »

sir,

where can we download the WLAN Assesment tools
Posted by: F3RL
« on: 20. March 2009., 12:06:51 »



Hi again, since I am interested in wireless communication I would like to share my experince
with tools I used to assess my wireless networks. Note that these are UNIX-based software.

Authentication attacks
 . PSK Cracking - coWPAtty, Rainbow Tables, aircrack-ng
 . LEAP Cracking - Anwrap, Asleap, LEAPcracker
 . Password Capture - Dsniff, WinSniffer, wireshark
 . VPN Login Cracking - ike_crack, pptp_bruter
 . HTTP auth Cracking - THC-Hydra

WLAN DoS attacks
 . Radio (RF) Jamming - Alchemy, HyperWRT
 . Beacon Flood - FakeAP
 . Deauth Flood - FATA-Jack, MDK3
 . EAP-of-Death - Libradiate

Station attacks
 . Driver exploits - Metasploit, LORCON
 . Staton probes - WZCOOK, nmap
 . EAP Injection - Void11, LORCON
 . EAP Replay - Airpwn, wnet reinject

Today, IT guys in my school actually wanted me to run a vulnerability assessment just because they
couldnt be bothered to walk around school doing the assessment - lazy tech guys ;D. After lunch time,
the school's IDS was not be able to detect ARP poisoning and decided to use ARPWatch for few days.
They still use WEP for staff's wireless network but they changed to WPA-TKIP now, with randomized
WPA passphrase. Anyway, those were tools I sometimes use for fun ;)

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Kursevi programiranja za ucenike u Sarajevu

Terms of Use | Privacy Policy | Advertising
TinyPortal 2.3.1 © 2005-2023