To see a updated list go here Installing Backtrack 5īacktrack 5 is free to download and install and can be downloaded here. While the Alfa AWUS036H supports wireless G. I have used both and both are good, but if possible get the Alfa AWUS036NH because it supports wireless N. The most common wireless USB adapter currently used are the Alfa AWUS036H and the Alfa AWUS036NH. It is because most wireless chipsets do not support packet injections or the things required to do a wireless attack. This is not because the adapter is not supported it may or may not be. One thing to mention also is that a internal wireless network adapter will not work with Backtrack and wireless penetration testing. Different manufactures do different things and have different setups so some have a weakness another will not. There are plenty to be found at yard sales and swap meets on the cheap. Learning commands and typing them in a terminal window is a must.īuying multiple routers to play with is also a good idea. The way you think about these attacks are as important as the attacks themselves. WPA or WPA2, which are really the same thing, are the way in which routers are now encrypted and much harder to crack. In the past WEP used to be the main encryption used on routers but WEP was notoriously easy to crack and is rarely seen any more. The two main types of wireless hacks are WPA dictionary attack, and Reaver. If you have Backtrack 5 installed the first chapter can be skipped directly to the hack you would like to use. There are different types of wireless attacks but in reality only two main types are used. If you have never used Backtrack before all you really need to know it is the best software to use for Digital Forensics, Intrusion Detection and Penetration Testing. Introductionīacktrack 5 R3 is a notorious Digital Forensic and Intrusion Detection software bundle with a whole lot of tools for Penetration Testing, It is based on Linux and includes 300 plus tools. Using aircrack and a dictionary to crack a WPA data captureĪll information in this book is for testing and educational purposes only for use by network security administrators or testing the security of your own wireless connection. Step by Step Backtrack 5 and wireless Hacking basics
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2022
Categories |