Saturday, November 17, 2007

Wireless Hacking

Wireless Hacking
350 mb of hacking tools for breaking WiFi... its highly illegal... be very carefull.... if ur in India .. no probs lolz...

Go break the WiFI !!!!!!!!!!!!
password: KaliMali


Download this e books

Replace k with p
WEP Hacking - The Next Generation
WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.

Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of "strong" encryption while a 128 bit key has 104. The IV is placed in encrypted frame's header, and is transmitted in plain text.

Traditionally, cracking WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packets—a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP crac*ing program such as Aircrack would be used to find the WEP key.

Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, "It doesn't matter if you use 128 bit WEP keys, you are vulnerable!"

Check this link :-

Video On Wifi Hacking with WIgle
Wifi hacking: finding hot-spots thru wigle

Utilities for Wifi Cracking
3.) All in one : WiFi Cr@ck Utils -8in1- (AIO)

Wifi Security & Hacking Course - Windows & Linux
HI G33ksS & h@cke&rs & wannabe hackers

Here comes a great opportunity to learn the black arts of computer technology - Ethical

Hacking from the comforts of your home.

Appin Knowledge Solutions offers you 3 Hacking courses

Level 1 - - $45
Level 2 - - $65
Combo Course - - $85

The courses are great value for money offerings and developed with participation from eminent

xperts in this field. It's also one of the most popular downloads on CNET.

Hack a Router
Check this Link out[]

Other than this.. you can use Brutus to get the WEP key... to hack Wifi ..nd websnake is very useful too... .. Brutus is only for getting the WEP key..

nd if this is not enuff..tell me.. i ll place more..cause this is jus basci stufff.. i hav lethal methods for WiFi hacking..those are highly illegal.. if this dosent work.. we will try those

Hacking Wireless Networks For Dummies
Become a cyber-hero - know the common wireless weaknesses

"Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional."
--Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) Program

Wireless networks are so convenient - not only for you, but also for those nefarious types who'd like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network's armor.

Discover how to:

* Perform ethical hacks without compromising a system
* Combat denial of service and WEP attacks
* Understand how invaders think
* Recognize the effects of different hacks
* Protect against war drivers and rogue devices

Download :


Have some practicals with the latest tools
check out

check out the following books :

802.11 Wireless LAN Fundamentals

802.11 Wireless Network Site Surveying and Installation
password: bugy

The HandBook of Ad Hoc Wireless Netoworks

Wi-Foo The Secrets Of Wireless Hacking
password: bugy

Technology Trends in Wireless Communications
password: bugy

Microwaves and Wireless Simplified (2nd Ed)
password: bugy

Bulletproof Wireless Security - Gsm, Umts, 802.11 And Ad Hoc Security
password: bugy

Handbook of Wireless Local Area Networks
password: bugy

Designing a Wireless Network
password: bugy


password: bugy

Technologies for the Wireless Future
password: bugy

Introduction to Data Networks: PDN, LAN, MAN, WAN, and Wireless Data,
Technologies and Systems

password: bugy

802.11 Wireless Networks The Definitive Guide
password: bugy

Wireless A to Z
password: bugy

The Hitchhiker's Guide to the Wireless Web
password: bugy

Mobile and Wireless Design Essentials
password: bugy

Wireless Internet Handbook Technologies, Standards, and Applications
password: bugy

Wi-Fi Handbook: Building 802.11b Wireless Networks
password: bugy

How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN
password: bugy

WLANS and WPANS towards 4G Wireless
password: bugy

Wireless Sensor Networks - Architectures and Protocols

Real 802.11 Security Wi-Fi Protected Access And 802.11i - Addison Wesley