Submitted by Rich on May 31, 2012 - 5:19pm
I have been using an Alfa AWUS036H for some time now. it's a great USB wireless card that supports injection, monitor mode, and runs 1000mW. The problem is while I can hit just about any access point I point it at the performance is horrible. I average about 2Mb on a 40Mb cable connection. Its just not acceptable. Its great for hacking but for regular use its worthless. During my playing I noticed that the Broadcom B43 card that came in my Dell mini also supports Injection and monitor mode, I can also run it at 1000mW. The Broadcom also averages around 20Mb to 30Mb download speed on my 40Mb cable connection, which isn't bad for wireless. The problem is I can't get near the coverage that I can with my Alfa. To solve this problem I have decided to add an external antenna to my internal wireless card.
Submitted by Rich on May 20, 2012 - 2:35pm
WEP, also known as Wired Equivalent Privacy is a form of encryption used in early WiFi networks. While its not recommended today they're are still a very high percentage of people still using it. As with most technology people just set it and forget it leaving a high number of under secured networks in the air waves. As always I am not recommending you try hacking your neighbors WiFi networks. This should be done with all of your own equipment.
Submitted by Rich on May 20, 2012 - 1:51pm
Known as security though obscurity many people may hide there ssid's from broadcasting. Just like mac address blocking this is a worthless form of protection. There is nothing secure about hiding your SSID. Its like the wizard hiding behind the curtain. It just does not add any value to your security and like mac address blocking it adds complication with no reward. Today I am going to show you how easy it is to reveal a hidden SSID using the aircrack-ng suite. First things first. Start airdump-ng by using the following command. Replace the interface with your own.
Submitted by Rich on May 6, 2012 - 7:22pm
I found a great way to have some fun with friends and family. Using Linux to kick an individual or everyone off of an access point. Fun times you say, well lets see.
Deauthing is you pretending to be the access point asking the client to re connect. You spoof a re authorization packet to the client which makes the client try to reconnect to the access point. However, because you are constantly sending these packets the client can't connect because they continuously need to re authenticate. This is also how people kick users to set up a man in the middle attack. When you kick the client the client will automatically find another known access point. If you provide that to then they will connect to it. However, we are not going to get in to man in the middle attacks today. Maybe another time. ;-)