00
Printable View
00
Greetz.
If the access point was meant to be used by out-siders then there would not be a psswrd..
And as far as an app to help you piggyback onto the access point, well me thinkz you are at the wrong site, cause most members here get paid to stop people with your intentions from doing what you wish to achieve..
Now i'm going to leave this thread remain open for a little while longer, and i'll let the members have there fun..:lildevil:
Oohh and welcome to AntiOnline. :)
00
I don't think so as the SSID and encryption/password protection are two different things. If what you are suggesting were readily available it would render most wireless networks useless from a security viewpoint.Quote:
my question is if there is a program that i would simply need to have the ssid and click on it and then it would get me the pasword for that router
You should also bear in mind that gaining unauthorised access may well be a criminal offence in your locality.
I think in that case the router is set to the "any" option, and your PC should detect it on bootup.Quote:
If the access point was meant to be used by out-siders then there would not be a psswrd..
Perhaps you should do a bit of Googling to find where the local free providers are in your area.
Over here (UK) it is pretty much all public libraries, railway stations, bus stations, airports, local government offices, tourist information centres, and a whole range of cafes, bars, hotels, and restaurants.
If you go to conferences and meetings then I would suggest you ask the organisers. They usually have "guest" facilities that are password protected to restrict the usage to attendees.
00
apez1267, we haven't been blessed with someone like you for so long I think members have forgotten how to respond. Times have changed!
First, let me get you started:
providing you have an Atheros card,
( in a terminal window )
airmon-ng stop ath0
airmon-ng start wifi0
airodump-ng ath0
I use those for recon ......... but not for finding targets to crack, but when setting up a W.A.P.
It is nice to know the channels being used in the area, the signal strength, etc.
My son has used it to crack into systems he is responsible for, just to show how easy it is ( and thus how insecure they are ) because many people ( especially those in charge of computer systems ) are just clueless as to what computer security is and need to be shown how bad the systems are ( that is what BackTrack and others are for. )
As stated by others, using someone's wireless may be a criminal offense, but I will go one further:
Even if you do not use the connection, in some places just monitoring ( cracking the encryption and just looking at the information being sent ) is another, separate criminal offense, simply because the signal was encrypted.
Not to mention having the tools to do so ( yet another, separate criminal offense. )
And wait!
Teaching someone how to use them can be yet another criminal offense!
( And no, when I helped my son learn to use BackTrack to crack WEP I broke no laws, because he was only interested in pen-testing networks he was responsible for; it was instructional for legitimate purposes. )
Tell your idiot friends that BackTrack ( notice it is one word ) is " focused on penetration testing. "
There are many more tools in it then just those to crack WEP, and maybe, if you are really interested in computers, you should learn to use them; maybe then you could impress them.
As IKnowNot points out, these are not hacker tools, but security analysis applications. As such they are in no way covert or subtle. They assume that you have the legal authority to use them and will use them for legal purposes only; so they don't attempt to hide their presence or activities.
They can also be quite complex............BackTrack for example, contains something like 300 individual applications.
As for legality, you have to consider both federal and state legislation.
http://artofhacking.com/tucops/etc/l...h_maryland.htm
Perhaps the most important thing to consider is your own security? There have been numerous instances of people setting up fake sites near popular public hotspots, so make sure that you are connected to the legitimate site.
Then there are these apparently unsecured nodes...............are they a deliberate trap?
In any case I wouldn't use one because if the people who set them up really don't know what they are doing, there is a fair chance that they are owned, and if you connect to their network then you will be as well. :eek:
00
00
Ahhh.. Just keep in mind members with purple usernames are moderator's, and those with red are the admin's here. taken from the site FAQ
So we have access to your IP addresse. So Nihil as he has access to view your IP addresse probably viewed it, and selected the maryland and as it would be closest to your area.. ;)
cheers
t34b4g5..:)
Quote:
So we have access to your IP addresse. So Nihil as he has access to view your IP addresse probably viewed it, and selected the maryland and as it would be closest to your area..
http://www.webmediabrands.com/corpor...acypolicy.htmlQuote:
We promise that we will use your personal information only in ways that are compatible with this Privacy Policy as follows:
Hhhmmmm
or maybe spelling bees :DQuote:
It sounds like you need a diversion
MLF
Hmmmm,
Never really thought about the IP address that much. If you look at the bottom under the poster's name you should see a computer screen icon.
If you put your mouse pointer on it, you get the IP address that the post was made from.
This does not require logging into the Admin/Mod application.
I think thats a mod\admin feature....I dont see the button you are talking about Nihil
MLF
Yeah, I don't have that button either...
button envy :D
To the OP, as they said some on here are not all that appreciative of what you might be considering. I on the other hand have never lived on their side of the tracks. I would suggest you do some googling and reading (I believe in reading and learning. The whole teaching to fish vs giving a fish thing). Do some googling on man in the middle attacks, arp poisoning or spoofing, cain and abel, airpcap, wireshark... these will lead to other areas of study. I believe you can even find some youtube videos of this sort of thing.
Sorry to anyone offended.
Also look at videos on Vimeo. John Strand has some good ones, as do the other guys from Pauldotcom.
Here are a few to get you started. Just don't be stupid. It is one thing to learn how this stuff works, quite another to use it for illegal purposes.
http://vimeo.com/videos/search:wep%20cracking
To illustrate my warnings, here is a case that was decided in Scotland today:
Actually, it was the very fact that he did this that got him found out. :DQuote:
Rennie was also found guilty of two charges of attempting to defeat the ends of justice by accessing insecure internet connections.
The story is here, but WARNING!!! THIS IS VERY NASTY STUFF.
Link
Now, supposing that these two unsecured internet connections had been secured with WEP and you cracked it. On the face of things your access appears authorised because you supplied the correct authentication.
Now suppose that the sites were actually controlled by the pedophile ring.........:shocked:
You just got yourself one hell of a lot of explaining to do (particularly as you can only protest your innocence by admitting a lesser criminal offence) and will have ALL your computer equipment, cellphones, cameras, media etc. impounded for at least 12 months.
Is it really worth the risk?