Description: In this video you will learn how to setup Reaver pro wireless cracking toolkit in Vmware.
Reaver Pro : - 1st question in your mind is what is Reaver Pro*, Reaver Pro is toolkit developed by eveloped by Tactical Network Solutions that exploits a protocol design flaw in WiFi Protected Setup (WPS). This vulnerability exposes a side-channel attack against Wi-Fi Protected Access (WPA) versions 1 and 2 allowing the extraction of the Pre-Shared Key (PSK) used to secure the network. With a well-chosen PSK, the WPA and WPA2 security protocols are assumed to be secure by a majority of the 802.11 security community.
Source : - http://www.tacnetsol.com/products/
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Original Source: http://www.youtube.com/watch?v=NqcWXHQ_22I
After the iPhone and Android tracking revelations of last week, a researcher finds out how to query Google’s database of home and business router locationsGoogle knows where it is. Photograph: Sipa Press / Rex Features
Google really does have a very big location map - and that may include where your router is. The results of its giant Street View exercise in which it took pictures of houses and shops but also gathered locations of Wi-Fi networks and - oops! - collected data from open Wi-Fi networks has all been collated.
And what’s more, you can query it yourself.
Got a Wi-Fi router? Got admin access to its interface? Then you can get its MAC address and plug it into the “android map” interface offered by Samy Kamkar, a hacker and researcher who last week showed that Android phones transmit their location data (as uncovered by another researcher, Magnus Eriksson)
The page where you can plug in the details is at http://samy.pl/androidmap/, and comes with an example MAC address in there, which if you click it shows the details that are held - log/lat, country, country code, region, county, city, street, house number, postal code, and “accuracy” - an interesting idea, though it’s not immediately obvious whether that’s accuracy in metres or some other metric.
As Kamkar explains,
android map exposes the data that Google has been collecting from virtually all Android devices and street view cars, using them essentially as global wardriving machines.
When the phone detects any wireless network, encrypted or otherwise, it sends the BSSID (MAC address) of the router along with signal strength, and most importantly, GPS coordinates up to the mothership. This page allows you to ping that database and find exactly where any wi-fi router in the world is located.
Personally, I tried it for the two Wi-Fi routers in my home, and it turned up nothing. It could be that the data for Britain has been wiped, or that my routers weren’t turned on the day Google drove by (it certainly did, because it’s got a pic of the front of the house) or that it somehow didn’t reach the car.
Scary? Encouraging? If all this data is somehow open sourced, is that useful or not?
purpose is to attack multiple WEP and WPA encrypted networks at the same time. this tool is customizable to be automated with only a few arguments.
# sorts targets by power (in dB); cracks closest access points first
# automatically deauths clients of hidden networks to decloak SSIDs
# numerous filters to specify exactly what to attack (wep/wpa/both, above certain signal strengths, channels, etc)
# customizable settings (timeouts, packets/sec, channel, change mac address, ignore fake-auth, etc)
# “anonymous” feature; changes MAC to a random address before attacking, then changes back when attacks are complete
# all WPA handshakes are backed up to wifite.py’s current directory
# smart WPA deauthentication — cycles between all clients and broadcast deauths
# stop any attack with Ctrl+C — options: continue, move onto next target, skip to cracking, or exit
# switching WEP attack methods does not reset IVs
# intel 4965 chipset fake-authentication support; uses wpa_supplicant workaround
# SKA support (untested)
# displays session summary at exit; shows any cracked keys
# all passwords saved to log.txt
# built-in updater: ./wifite.py -upgrade
For Educational Purpose Only