Followers
About Me
Monday, December 7, 2009
Wireless Hacking Live – FBI version ISO
1:09 AM |
Posted by
Scripts Power |
Edit Post
Wireless Hacking Live – FBI version ISO
Wireless Hacking Live – FBI version ISO | 635.24 MB
Live Cd For Wireless Hacking, Also Used By The FBI
This version is for all systems except systems with the Intel B/G wireless cards (IPW2200).
- Live CD with all the tools you need to hack a WLAN / wireless Access point – Linux Live-CD – OS runs from CD – 635 mb – .iso
- also used by the FBI.
WEP Hacking – The Next Generation
WEP Hacking – The Next Generation
WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.
Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of “strong” encryption while a 128 bit key has 104. The IV is placed in encrypted frame’s header, and is transmitted in plain text.
Traditionally, crac*ing WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packets—a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP crac*ing program such as Aircrac* would be used to find the WEP key.
Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, “It doesn’t matter if you use 128 bit WEP keys, you are vulnerable!”
WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products.
WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.
Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long.
A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of “strong” encryption while a 128 bit key has 104.
The IV is placed in encrypted frame’s header, and is transmitted in plain text.
Traditionally, cracking WEP keys has been a slow and boring process.
An attacker would have to capture hundreds of thousands or millions of packets a process that could take hours or even days, depending on the volume of traffic passing over the wireless network.
After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key.
Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared.
This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours.
Download Links
Hotfile
http://hotfile.com/dl/17436823/f4488b1/Wireless_Hacking_Live-CD.part1.rar.html
http://hotfile.com/dl/17436868/65c1c88/Wireless_Hacking_Live-CD.part2.rar.html
http://hotfile.com/dl/17436929/5fb1418/Wireless_Hacking_Live-CD.part3.rar.html
http://hotfile.com/dl/17436958/320e04a/Wireless_Hacking_Live-CD.part4.rar.html
http://hotfile.com/dl/17436984/e0f0299/Wireless_Hacking_Live-CD.part5.rar.html
http://hotfile.com/dl/17436994/88cffd7/Wireless_Hacking_Live-CD.part6.rar.html
http://hotfile.com/dl/17437027/20c64ed/Wireless_Hacking_Live-CD.part7.rar.html
Uploading
http://uploading.com/files/22e259a5/Wireless_Hacking_Live-CD.part1.rar
http://uploading.com/files/82m525f4/Wireless_Hacking_Live-CD.part2.rar
http://uploading.com/files/f92472f9/Wireless_Hacking_Live-CD.part3.rar
http://uploading.com/files/f2ce897d/Wireless_Hacking_Live-CD.part4.rar
http://uploading.com/files/c1894729/Wireless_Hacking_Live-CD.part5.rar
http://uploading.com/files/a37af487/Wireless_Hacking_Live-CD.part6.rar
http://uploading.com/files/7f68356f/Wireless_Hacking_Live-CD.part7.rar
Password ( www.fbscripts.blogspot.com }
( please ADD your Comments )
Labels:
Fbi Software
Subscribe to:
Post Comments (Atom)
Blog Archive
-
▼
2009
(513)
-
▼
December
(27)
- New Blog Templets
- GavickPro Corporate Ltd v2.0.1 Update - Joomla 1.5...
- Collection of 17 ebooks about Joomla
- Yootheme Explorer – December 2009 Joomla Template
- Artisteer 2.3.0.21098 Final
- The Complete English Grammar Video Tutorial Series
- Joomla Big templets
- Musemix is the new Joomla! theme, released at Bonu...
- Premium joomla templates
- Fast Blog Finder v2.51
- JA News - Joomla! Magazine extension
- Joomla.Bamboo.Slider.Full
- Make a Joomla Template in 5 Easy Steps, ebook
- 75 Joomla Modules
- IT ViewPoint – September 09 Joomla Template
- The Complete English Grammar Video Tutorial Series
- Business Revolution full joomla template
- Facebook-Clone
- www.Facebook.com
- Head First Ajax
- Joomla Big Components Pack
- FBI Wireless Hacking Live DVD
- CBT Nuggets Cisco CCNA Wireless IUWNE 640-721
- Pure Networks Speed Meter Pro 1.2.8289
- 4 AIO in One Hacking Video Training and Ebooks Col...
- Best Hacking Books AIO 2009
- Wireless Hacking Live – FBI version ISO
-
▼
December
(27)
0 comments:
Post a Comment