ULWiz wrote: Not sure where else to post this but here. I have been interested in security for a few years now and am hoping to land a career in this field many more years down the road. I recently decided that i wanted to learn how to crack a WEP key for example. Currently running a few programs like wireshark and the aircrack-ng package. I am see different AP's and anything that is connected to it while capturing their packets. With that file i would be able to crack it if my list contains that pw if not i dont believe its possible. My issue at this point is that my password.lst file only has a possible 230 passwords when it checks. When i see the videos online these guys have thousands of possible passwords listed in their file. Does anyone know where a file like this can be grabbed. Its just a simple text file with a word on each line. Only difference is the amount of possibilities in there. Really looking for a text file with the entire dictionary in it. Any help here is appreciated.
Secondly, don't attempt to crack other people's WEP, that is a felony.
ULWiz wrote: Dynamik mind posting the command you see for this cause i dont see it.
ULWiz wrote: I recently decided that i wanted to learn how to crack a WEP key for example.
Sie wrote: Dynamik, Your absolutely correct for WEP however I think ULWiz is talking about WPA which would require a brute force approach hence the password lists.
dynamik wrote: Sie wrote: Dynamik, Your absolutely correct for WEP however I think ULWiz is talking about WPA which would require a brute force approach hence the password lists. You were the first one to mention WPA, and that was in the 9th post. When did we switch over to that? UL, are you trying to crack WEP or WPA? Here's another article for you: http://docs.lucidinteractive.ca/index.php/Cracking_WEP_and_WPA_Wireless_Networks
Sie wrote: WPA requires you capture a four way handshake and run aircrack and a password list against the cap file. Essentially runnning a brute force password crack.
JDMurray wrote: Sie wrote: WPA requires you capture a four way handshake and run aircrack and a password list against the cap file. Essentially runnning a brute force password crack. Well, good luck with that. No WPA-PSK passphrase I've ever used has appeared in any dictionary. It would take pure brute force or nothing.
Sie wrote: Also thanks for pointing out that error. It infact isnt a brute force, it purely is a dictionary/password list based attack. Its a looooooooong night
dynamik wrote: I got mine from here: https://www.grc.com/passwords.htm If you're ever in MN, you're welcome to stop by and give it a try
dynamik wrote: Do you have any idea how long it took me to enter that into my Wii with that stupid remote?