Skip to main content

Posts

Showing posts from October, 2008

Super Bluetooth Hack 1.8

Free Download Super Bluetooth Hack 1.8 Compatible With: Alcatel: One Touch 557, One Touch 557a, One Touch 735, One Touch 756, One Touch C550, One Touch C552, One Touch C552a, One Touch C750, One Touch S853 Asus: P525 Audiovox: SMT 5600 BenQ: A520, C30, EF51, P50 BenQ-Siemens: CL71, E61, S81, S88 BlackBerry: 6220, 6230, 6280, 6720, 7100, 7100i, 7130, 7130e, 7210, 7230, 7250, 7280, 7290, 7510, 7520, 7730, 8100, 8130, 8300, 8310, 8320, 8700, 8703e, 8707, 8800, 8820, 8830 CECT: A1000 Cingular: Cingular 2125, Cingular BlackJack Dopod: Dopod 515, Dopod 557w, Dopod 565, Dopod 575, Dopod 585, Dopod 586w, Dopod 595, Dopod C720W HP: iPAQ 510 Mobile Messenger HTC: HTC MTeoR, HTC S310, HTC S620, HTC S650, HTC S710, P3400, P3450 Huawei: U526, U626 i-mate: i-mate Smartphone2, i-mate SP Jas, i-mate SP3, i-mate SP3i, i-mate SP5, i-mate SP5m, i-mate SPL I-mobile: 510 Lenovo: V800 LG: B2000, B2050, B2070, B2100, B2150, C1100, C1150, C2000, C2500, C2600, C3100, C3300, C3400, CG225, CU400, CU500, F2400, G

Wirelessly Keyboard Hack

Wired keyboards emit electromagnetic waves, because they contain eletronic components. These eletromagnetic radiation could reveal sensitive information such as keystrokes. Although Kuhn already tagged keyboards as risky, we did not find any experiment or evidence proving or refuting the practical feasibility to remotely eavesdrop keystrokes, especially on modern keyboards. To determine if wired keyboards generate compromising emanations, we measured the electromagnetic radiations emitted when keys are pressed. To analyze compromising radiations, we generally use a receiver tuned on a specific frequency. However, this method may not be optimal: the signal does not contain the maximal entropy since a significant amount of information is lost. Our approach was to acquire the signal directly from the antenna and to work on the whole captured electromagnetic spectrum. We found 4 different ways (including the Kuhn attack) to fully or partially recover keystrokes from wired keyboards at a di

Arpwatch

Arpwatch is a tool that monitors ethernet activity and keeps a database of ethernet/ip address pairings. It also reports certain changes via email. Arpwatch uses libpcap, a system-independent interface for user-level packet capture. Before building tcpdump, you must first retrieve and build libpcap, also from LBL, in: ftp://ftp.ee.lbl.gov/libpcap-*.tar.Z.

How to catch hackers on your wireless network

There are lots of tools around to help people carry out ARP-related exploits and if a malicious, Wi-Fi enabled neighbour decided to find out more about your network, this could be an effective way to do it. The good news is that there are some defences out there. The bad? They can be costly and don’t always deliver the protection you might expect. Arpdefender is a good example. It’s a solid-state security appliance that you simply connect to your network, then leave to look out for ARP poisoning attacks. It would be excellent if not for the fact that it costs almost £300 and, even if it does detect an attack, will do little more than make an entry in your system logs more via thewifihack.com

Intel Wireless Wi-Fi 5100 Card injection OK

Intel Wireless Wi-Fi 5100 Card injection test is working OK with kernel linux-2.6.27-rc7.tar.bz2, patchet with the latest iwlwifi drivers patch, wich enables packet injection for iwlagn. In order to get injection working on Intel 5100 card download the latest linux-2.6.27-rc7.tar.bz2 kernel and patch the iwlwifi driver with the diffs from the latest kernel iwlwifi driver changes from Stefanik Gábor.

Cracking WPA with GPU support

Pyrit takes a step ahead in attacking WPA-PSK and WPA2-PSK, the protocol that today de-facto protects public WIFI-airspace. The project's goal is to estimate the real-world security provided by these protocols. Pyrit does not provide binary files or wordlists and does not encourage anyone to participate or engage in any harmful activity. This is a research project, not a cracking tool. Pyrit's implementation allows to create massive databases, pre-computing part of the WPA/WPA2-PSK authentication phase in a space-time-tradeoff. The performance gain for real-world-attacks is in the range of three orders of magnitude which urges for re-consideration of the protocol's security. Exploiting the computational power of GPUs, this is currently by far the most powerful attack against one of the world's most used security-protocols.

Giga Password Generator

"Giga password Generat0r". It has 23 differents modes for generating almost everything, including hexadecimal and personnal charset. The script is using the crunch generator, which makes it really fast to generate. The script is still in dev, I will add more modes later so that it will cover all the possibilities, including special chars and blank spaces. The script is still in french yet, I will translate it when I will find some time. You can download the script here: Giga Password Generat0r v 1.2 (latest version with 23 generating modes)

AiroWizard 1.0 Beta revision 240

The WEP key recovering utility for Windows AiroWizard 1.0 Beta revision 240 Changes : -adapter list tab: "Check vendor" button no longer invokes the messagebox with the vendor name.The vendor's name is now under the "vendor" label.As Mister_X suggested, i transfered the mac codes text files to a database, so that clicking on the particular adapter in adapter list no longer hogs the CPU (as much...). http://airowizard.webs.com/adapters.gif -monitor mode tab: Here's something for Zermelo.If airserv-ng is not running, there's no way to run any other part of the suite dependable of airserv-ng. http://airowizard.webs.com/monitor.gif -wep crack and recovery tab: Here's something for Zermelo, again.Added the ivsools support, as well as the dictionary switch. http://airowizard.webs.com/aircrack.gif -advanced tab: As Mister_X suggested, i've added the "Usage help" button, which invokes new form with the redirected output from a program (without

Fast-Track version 3.4

* Small change, I dynamically generate the version numbers now in menu and command line mode, before you may have noticed it said Version 3 and never changed with different versions. Now its showing the correct version numbers every update. * Changed the changelog.txt and credits.txt to CREDITS and CHANGELOG. Also modified credits to be up to date. * Fixed a bug where going to About in menu mode would cause Fast-Track to crash. * Added error handling if Fast-Track Web GUI if the port was already in use. * Removed the Shikata Ga Nai encoding from Fast-Track's SQLPWANGE, it was causing issues on some systems with corruptable executabls. * Added better cleanup in SQLPwnage to remove H2B files as soon as the conversion to binary is completed. * Added a "browse" button to the wordlist specification in sql bruter and in binary to hex generator. Before you had to manually specify the wordlist or file to convert, now you just hit the browse button and navigate to it. * Changed th

Spoonwep2

spoonwep adds an automatic victim sniffer, presenting results of airodump in an intuitive manner http://neovortex.kodings.googlepages.com/spoonwep2.lzm demo : http://neovortex.kodings.googlepages.com/spoonwep2vid.htm INSTALLATION/UPDATE : LIVE INSTALL : copy the spoonwep2.lzm to /BT3/modules onto your usb or into your iso REAL & LIVE+CHANGES INSTALL : open a shell and type this : lzm2dir spoonwep2.lzm / you still can launch it from the command line typing : spoonwep demo: old spoonwep http://neovortex.kodings.googlepages.com/spoonwepvid.htm

Tool Spoonwpa Wpa Key

http://shamanvirtuel.googlepages.com/SWPA.lzm lzm2dir SWPA.lzm / or copy it to module folder that adds a link into kmenu in wifi/cracking or you can launch it typing spoonwpa in a shell demo: http://neovortex.kodings.googlepages.com/spoonwpavid.htm

Tool Spoonwpa Wpa Key

http://shamanvirtuel.googlepages.com/SWPA.lzm lzm2dir SWPA.lzm / or copy it to module folder that adds a link into kmenu in wifi/cracking or you can launch it typing spoonwpa in a shell demo: http://neovortex.kodings.googlepages.com/spoonwpavid.htm

Installing Backtrack 3 under VirtualBox - Part 3

29.): You can install software on Backtrack 3 and save 'Snapshots' to save your place or follow another tutorial about making any changes 'sticky' to preserve your work between boots. Go back to your "Settings" and change the "Radio Button" to finish using the Backtrack 3 installation .ISO image on your HD. 30.): See these threads for info on copying the CD/DVD-ROM .ISO image to VirtualBox's virtual HD drives so you can make changes and update your software without resorting to Snapshots to make things sticky. How to install backtrack 3 final from the shell hxxp://forums.remote-exploit.org/showthread.php?t=14751 Install BT3 live onto flash, save changes, with compiz hxxp://forums.remote-exploit.org/showthread.php?t=14812 TUTORIAL: live install with changes, swap and data partitions hxxp://forums.remote-exploit.org/showthread.php?t=7844 How to install BT3Final onto external USB HDD - Solve the Kernel Panic hxxp://forums.remote-exploit.org/showthre

Installing Backtrack 3 under VirtualBox - Part 2

10.): In the "General", "Settings", "Advanced" tab you should do the following: Click the "Boot Order", "Floppy" checkbox to uncheck it. The "CD/DVD-ROM" should be the first boot device (for installation only). You can leave the "Boot Order", "Hard Disk" checkbox checked, you will re-order the drives later. Leave the "Extended Features", "Enable ACPI" checkbox checked. Click the "Extended Features", "Enable IO APIC" checkbox to make it checked. If you have a newer CPU then click the "Extended Features", "Enable VT-x/AMD-V" checkbox to make it checked. Click the "Extended Features", "Enable PAE/NX" checkbox to make it checked. Choose "Bidirectional" for the "Shared Clipboard" setting. Choose "PIIX4 for the "IDE Controller Type" (PIIX3 does not implement an SMBus or I2C bus). Change the "Sna

Installing Backtrack 3 under VirtualBox

Intro: This is a Tutorial on how to install Backtrack 3 (Linux) on Windows XP so you will be able to run both Windows and Backtrack 3 (Linux) at the same time without rebooting. It is written "skiny" so you can read it on one side of the screen and install Backtrack 3 in VirtualBox on the other side of the screen. The text "hxxp://." means to use http and add "www" . In this Tutorial we will be using the free virtualization tool VirtualBox. If you have ever used VMWare then the procedure is similar but there are a few more steps (and the ability to directly access your hardware (ONLY if you have a NEW computer that supports either VT-x or AMD-V)). I have Backtrack 3 working perfectly and can boot from my harddrive, your results may be better (or worse) depending on: your computer, your "Wireless Network Adapter" driver, your choice of "Wireless Network Adapter" card and your abilities in general. It is also possible to use VirtualBox t