Search found 4 matches

Return to advanced search

Re: Handshake Quesion.

Short Answer: Once you have the handshake you can leave. Once you have the 4-way handshake, the cracking process for WPA/WPA2 attacks is entirely offline. Routers simply can't handle the brute-forcing you're about to inflict upon that handshake. The offline brute-force is undetectable since its on y...
by NamekianUnix
on Mon Nov 20, 2017 12:22 am
 
Forum: Networking
Topic: Handshake Quesion.
Comments: 1
Views: 10214

Re: Introduce Yourself  Topic is solved

Hello All I may be new to this community, but not the subject. If it has anything to do with Forensics, Exploitation, Security, or Staying off the Radar... I love it! It's nice to see a community full of like minded people. To be honest, I actually enjoy helping people get started. :) It'll be nice ...
by NamekianUnix
on Mon May 11, 2015 10:16 pm
 
Forum: NZone
Topic: Introduce Yourself
Comments: 1646
Views: 2444397

Re: New PixieWPS tool added to Aircrack-ng/Reaver

Haha, slim chance. I bypass church internet all the time. The way I see it, If it's not harming anyone, go for it.

Annnd before this gets moved into the Ethics section...

Did it work out well? How long did it take?
by NamekianUnix
on Mon May 11, 2015 1:44 pm
 
Forum: Networking
Topic: New PixieWPS tool added to Aircrack-ng/Reaver
Comments: 6
Views: 12670

New PixieWPS tool added to Aircrack-ng/Reaver

As of May 4th, Kali Linux has added PixieWPS to their package. This speeds up WPS cracking exponentially! Instead of 12-48 hours of cracking a WPS pins, it now takes seconds! I would consider WPS to be more vulnerable than WEP now! Though WPS has always been vulnerable. This new method takes the cak...
by NamekianUnix
on Thu May 07, 2015 12:36 am
 
Forum: Networking
Topic: New PixieWPS tool added to Aircrack-ng/Reaver
Comments: 6
Views: 12670

Return to advanced search