I needed to setup a site-to-site VPN between my home and my parent’s home, so that we can back up our stuff offsite – mostly documents and precious digital photos.
I wanted it to be a proper routed VPN network, not a bridged one. By that I mean an OpenVPN tun setup, not an OpenVPN tap … Read more »
Finally, I’ve had time to write down my notes on using aircrack-ng with the Airpcap Tx adapter in Windows. Before you read on, please be aware that this isn’t meant to be a guide or tutorial, it’s just my notes. Thanky 🙂
airodump-ng \\.\airpcap00 airpcap CHANNELNUMBER mycapturefile
aireplay-ng --fakeauth 0 -e "MYSSID" -a BSSIDMAC -h AIRPCAPMAC \\.\airpcap00
aireplay-ng --arpreplay -b BSSIDMAC -h CLIENTMAC \\.\airpcap00
Deauth (if we need ARPs):
aireplay-ng –deauth 3 -a BSSIDMAC -c CLIENTMAC … Read more »
This is pretty cool: Whilst searching for an alternative to HyperTerminal that supports Serial Port connections, I discovered that PuTTY now connects to Serial COM ports as well as the usual SSH/Telnet stuff 😀
As a business you can’t use HyperTerminal Private Edition unless you pay a licence fee; and now that Microsoft has removed HyperTerminal … Read more »
Every time you deploy a WEP Access Point, a fluffy kitty dies.
Recently a team of German cryptography researchers perfected methods to recover a WEP key faster than ever before. The older Weak IV attacks generally needed between 500,000 and 2,000,000 packets to recover a 128-bit WEP key. In contrast, the new PTW method needs a … Read more »
As of version 0.9, the aircrack-ng suite natively supports the PTW attack. Download it here. To invoke the PTW attack in aircrack-ng, run it with the -z switch: aircrack-ng.exe -z mycapturefile.cap.
A French chap has compiled Aircrack-PTW for Windows. This is great for anyone using the AirPcap adapter to inject packets in Windows, as the new … Read more »