Menú

Mostrar Mensajes

Esta sección te permite ver todos los mensajes escritos por este usuario. Ten en cuenta que sólo puedes ver los mensajes escritos en zonas a las que tienes acceso en este momento.

Mostrar Mensajes Menú

Mensajes - Martin-Ph03n1X

#51
Hacking / Re: ARDAMAX 4.0
10 Octubre 2012, 08:49 AM
pasa el link de descarga para ver que estas haciendo mal
#52
Cita de: Martin-Ph03n1X en 20 Agosto 2012, 05:32 AM
MIRA PARA ES CHIP SET AR PUEDES USAR EL BACKTRAC5 QUE LO TRAE INCORPORADO PERO DESPUES DE PONELO EN MODO MONITOR TENDRAS QUE BAJARTE EL CODIGO COMO LO HACEN EN LA SIGUIENTE EXPLICACION AHORA TE LO PASO[youtube=425,350] http://www.youtube.com/watch?v=IuQ4mAUhpYc[/youtube]

Download Reaver Pro: http://xiaopan.co/forums/threads/vip-reaver-pro-available.136/ (Mac + PC + Linux)

What does It Do?
In a nutshell it cracks WPS WPA/WPA2-PSK Wireless (Wi-Fi) Networks

How Good Is It?
Good, but could be better, and there is something better :). You are better off with Xiaopan OS 0.4.3 (has expert GUI for Reaver called 'Inflator') which I have tested and it is amazing. It will be released soon :)

We will be making a huge effort to make more cards compatible and help you as much as we can with prompt service. Please join us in the forums and check the link above for additional information.

Windows + Mac Compatible [VMware / Parallels Desktop / Workstation / Virtualbox / Live CD / Live USB]

What is Reaver Pro? (From Tactical Network Solutions Website)
Reaver is a WPA attack tool developed by Tactical Network Solutions that exploits a protocol design flaw in WiFi Protected Setup (WPS). This vulnerability exposes a side-channel attack against Wi-Fi Protected Access (WPA) versions 1 and 2 allowing the extraction of the Pre-Shared Key (PSK) used to secure the network. With a well-chosen PSK, the WPA and WPA2 security protocols are assumed to be secure by a majority of the 802.11 security community.

WPS allows users to enter an 8 digit PIN to connect to a secured network without having to enter a passphrase. When a user supplies the correct PIN the access point essentially gives the user the WPA/WPA2 PSK that is needed to connect to the network. Reaver will determine an access point's PIN and then extract the PSK and give it to the attacker.

Current attacks against WPA networks involve the computation of rainbow tables based on a dictionary of potential keys and the name (SSID) of the network being attacked. Rainbow tables must be re-generated for each network encountered and are only successful if the PSK is a dictionary word. However, Reaver is not restricted by the limitations of traditional dictionary-based attacks. Reaver is able to extract the WPA PSK from the access point within 4 - 10 hours and roughly 95% of modern consumer-grade access points ship with WPS enabled by default.

Get Reaver Pro
You can find the free, open source version of Reaver at Google Code

Tactical Network Solutions is now pleased to offer a commercial version of Reaver called Reaver Pro. Reaver Pro is a dedicated hardware kit that allows operators to effortlessly conduct WPS attacks via a graphcial web interface. The hardware is preconfigured and tested for field use, operators only have to plug it and start the attack. Simply connect the bootable USB and provided wireless card into a laptop and boot to the Reaver Pro distribution. Browse to the localhost in a web browser, and select the network you want to attack, it's that easy!


Boot from the Reaver Pro USB.

1. Plug in your USB stick
2. Plug in your Reaver Pro receiver
3. Restart or reboot your Windows or Linux computer
4. Access your BIOS settings to change the boot devices and the order in which they boot from. You need to boot to USB first before your hard disk with your native operating system.

• To access your BIOS you generally have to push a function key such as F1 or F2

5. Save your settings then reboot your BIOS
6. After Reaver GUI boots you will be able to plug and play

Run Reaver Pro GUI in Virtual Machine (VM) Environment in your Native Operating System

This enables Reaver Pro to be fully compatible with Mac and Windows. You will need some sort of virtualisation software like Parallels (paid), VMware (paid) or VirtualBox (free). You will also need to copy the files from your Reaver Pro USB and use Plop Boot Manager (plbpt.iso) to create an iso image file which you can boot into if you want to use a Live CD or USB on a Mac. http://www.plop.at/en/bootmanager/index.html

The downside of running a VM is that your system resources will be shared between your native OS, Reaver OS and the VM software you are running. This is the only option on a Mac because they have EFI boot. Do not bother trying to boot Reaver via USB.

Buy the Reaver Pro Kit: http://www.tacnetsol.com/products/
#53
ssh que no esta hablando de windows? por ser noob ?
#54
estas siendoa busado por tu ignorancia ... la policia no te busca solo es un estafador que te queire quitar tu dinero hasta que no toquen tu puerta y te digan las leyes en tu carota y que cita tienes hasta ese entonces actuas por ahora solo queda pensar en tranquilidad.....

si queires investigar algo es posible que la persona que creo tal perfil sea alguien que ocnsiguio robarte tu contraseña inalambrica que es muy facil hoy en dia estas cosas saludos.
#55
madpitbull alguna buena forma de aprender ingles la que sea.... plz aporten es necesario no siempre vamos estas abajo.... viendo las redes como algo de grandes....
#56
Redes / Re: configurando router
28 Septiembre 2012, 20:02 PM
si y de hecho la mayoria de routers traen habilitado el telnet a estas alturas asi es que vaz por buen camino....
#57
Cita de: FabianZS en 11 Septiembre 2012, 03:22 AM
:xD me mate de la risa cuando vi la camioneta jasdjajsd se pegaron el bruto fail. >:D
bien que haga gracias pero tenpor seguro que al encargado del comercial le fue muy mal
#58
gracias por la info ahora solo falta comprarme mi android movile xD
#59
Redes / Re: configurando router
27 Septiembre 2012, 19:30 PM
xD a ver para emepzar mientras esta prendido hacle reset 10 segundos y espera a que se restablesca y de nuevo chekate que pedo con todo yq ue sea accessible por telnet http ETC,...
#60
que bueno que llegaste con el usuario oficial que lo compartió el estiumado P4nd3m0n1um ya que en otros lados ni los creditos dan a lo que veo...