Networking

[Networking][bleft]

System Tweaks

[System Tweaks][threecolumns]

WiFi Slax Wireless Hacking Live CD v3.1 + download from here.

Wifislax is based primarily and principally in SLAX (based on the distribution Slackware Linux ), but due to work done by the authors of BackTrack has worked directly on this latest live CD, so the Wifislax catalog as a live CD could even be considered as wrong. Also available are all scripts and source codes, which can be used to build your own live CD .
 It increased the recognition of wireless cards (wireless) because that is the ultimate goal of this live CD, have a safety tool aimed at the workplace that we like, which is the wireless audit , so to this day, no depends on the applications and drivers that other large groups to join in their live CD, but dotaremos to our system of applications that we designed ourselves and translated into Spanish, or other alternatives to consider them fit to do so, you only have to communicate and we can at least promise to try to do it.Basic Directions:
WifiSlax is generally focus the security on the wireless system and network computing. anyway now come to the point.

The main menu of Wifislax:
The Content section is divided into Drivers , Applications , and the new section on Bluetooth that both boom is having in recent times.
for more visit.
Wifislax version 3.1 (648MB)

Wifislax version 3.1 - small (290MB)


Basic Directions:
1.Boot from cd
2.Get the wep key
3.Write it down
4.Reboot into windows
5.Connect using wep key.
WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.
Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of "strong"encryption while a 128 bit key has 104. The IV is placed in encrypted frame's header, and is transmitted in plain text.
Traditionally, cracking WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packets* a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key.
Post A Comment
  • Blogger Comment using Blogger
  • Facebook Comment using Facebook
  • Disqus Comment using Disqus

No comments :


Sponsored Here ...

Registry Tweaks

[Registry Tweaks][grids]

Social Tweaks

[Facebook][twocolumns]

Browsers

[Browsers][list]

Downloads

[Downloads][twocolumns]