| Both sides previous revisionPrevious revisionNext revision | Previous revision | 
| quotes [2011/03/22 23:49]  – quote by tefx n3cre0 | quotes [2019/04/14 22:47] (current)  – quote from only mister_x | 
|---|
| [23:19] <Tefx > WiFiHelper, i think you a bot but i shal give that a try thanks | [23:19] <Tefx > WiFiHelper, i think you a bot but i shal give that a try thanks | 
| [23:19] <WiFiHelper > Tefx: Error: "i" is not a valid command. | [23:19] <WiFiHelper > Tefx: Error: "i" is not a valid command. | 
|  |  | 
|  | Quote from SniperXP: | 
|  | <SniperXPX> I have the handshake packets for my WPA protected network. How would I go about bruteforcing the key? I can use disctionaries no problem but I cannot find anything about Bruteforcing | 
|  | <SniperXPX> dictionaries* | 
|  | <Zero_Chaos> !john | 
|  | <WiFiHelper> Zero_Chaos: "john" is (#1) http://tinyshell.be/aircrackng/forum/index.php?topic=176.0 or (#2) john --stdout --incremental | aircrack-ng -a 2 -w - <handshakes>.cap -e <essid> or (#3) http://www.openwall.com/john/ or (#4) http://openwall.info/wiki/john/markov | 
|  | <Zero_Chaos> you have 11,000 years right? | 
|  | <SniperXPX> I do not think the password is all that strong | 
|  | <SniperXPX> I do have access to a dual CPU xeon server | 
|  | <SniperXPX> I can leave that server running the job for weeks if I want to | 
|  | <Zero_Chaos> 11,000 years | 
|  | <hiexpo> lol | 
|  | <SniperXPX> I doubt the password is 64char | 
|  | <SniperXPX> It's most liekly 8-10 | 
|  | <SniperXPX> likely* | 
|  | <Zero_Chaos> LOL | 
|  | <Zero_Chaos> yeah, that is 11,000 years | 
|  | <SniperXPX> Seriously? | 
|  | <Zero_Chaos> yeah, please consult a calulator | 
|  |  | 
|  | Quote from Zero_Chaos: | 
|  | <allfro> alright.. brb | 
|  | <allfro> build complete | 
|  | <allfro> patch applied | 
|  | <Zero_Chaos> hopefully in the opposite order... | 
|  |  | 
|  | Quote from maslen: | 
|  | <haxwithdroid> I'd like to propose a new code style standard. COK: cat on keyboard. | 
|  | <maslen> Why not just call it perl ? | 
|  | <jeffree> damn | 
|  | <haxwithdroid> cok can be applied to any language | 
|  | <maslen> Yes. And then they'll all look like PERL | 
|  |  | 
|  | Quote from only: | 
|  | <only> hey folks, can I set an Alfa USB wifi into monitor mode on macOS? | 
|  | <only> I have installed the drivers and see it as `en6` | 
|  | <only> or do I absolutely need a Linux VM? | 
|  | <Mister_X> only, you can capture with the internal card with wireshark | 
|  | <Mister_X> there is no injection | 
|  | <Mister_X> you can't use another card AFAIK | 
|  | <Mister_X> if you want to use that USB card, you'll either need to boot into a live linux (or installed on your mac) or a VM | 
|  | ... | 
|  | <only> Mister_X: so absolutely no workaround to this? :\ | 
|  | <Fishman> only: osx drivers are all closed source.  expect to never have monitor mode on them. | 
|  | <Mister_X> only, yes, write a driver for it | 
|  | <only> well, that's what I was thinking.. surely someone thought about running rtl8812au natively in os x | 
|  | <Fishman> only: basically, no. | 
|  | ... | 
|  | # A few hours later: | 
|  | <only> no, I mean, how do I access the interfrace from within the linux vm? | 
|  | <only> on mac os | 
|  | <only> hey folks, has anyone used an external wifi adapter in monitor mode on a Mac? | 
|  | <Zero_Chaos> only: still not possible.  no one fixed it for you in the last 3 hours | 
|  | <only> Zero_Chaos: fair enough | 
|  | * only has quit (Quit: Leaving...) |