Posts

Showing posts from January, 2013
Image
17.CAFFE LATTE ATTACK:     In the Honeypot attacks , we notice that clients will continuously probe for SSIDs they have connected to previously. If the client had connected to an access point using WEP, operati ng systems such as Windows, cache and store the WEP key. The next ti me the client connects to the same access point, the Windows wireless confi gurati on manager automati cally uses the stored key.                                                   The Caffe Latte attack is a WEP att ack which allows a hacker to retrieve the WEP key of the authorized network, using just the client. The attack does not require the client to be anywhere close to the authorized WEP network. It can crack the WEP key using just the isolated client.           In this  exercise, we will retreive the WEP key of a network from a client using the Caffe Latte attack. CONDUCTING THE CAFFE LATTE ATTACK:  Follow these instructi ons to get started: STEP 1:            Let us fi rst set up our legiti
Image
16.HOW TO MAKE UR OWN CRYPTER: What you will need: Visual Basic 6 or Visual Basic 6 Portable A RC4 module A brain The RC4 module and Visual Basic 6 Portable will have the download links at the end of this tutorial. TABLE OF CONTENTS: 1. Introduction 2. Building your crypter 3. Conclusion 1. Introduction RC4 : In cryptography , RC4 (also known as ARCFOUR or ARC4 meaning Alleged RC4, see below) is the most widely used stream cipher and is used in protocols such as Secure Sockets Layer (SSL) (to protect Internet traffic) and WEP (to secure wireless networks). Stub : A method stub or simply stub in software development is a piece of code used to stand in for some other programming functionality. A stub may simulate the behavior of existing code (such as a procedure on a remote machine) or be a temporary substitute for yet-to-be-developed code. Stubs are therefore most useful in porting, distributed computing as well as general software developm