- This topic has 7 replies, 1 voice, and was last updated 1 week, 1 day ago by
teragoodness.
-
AuthorPosts
-
-
July 20, 2006 at 7:58 pm #570
Don Donzal
KeymasterWell, it’s been a long time coming, but our wireless guru, Dan Hoffman, is back on the saddle. And boy was it worth the wait. This article is a long one, but the word ‘Cool’ in the title is absolutely justified.
So enjoy Cool and Illegal Wireless Hotspot Hacks, and be sure to add your thoughts below.
Don
-
This topic was modified 2 years, 11 months ago by
Don Donzal.
-
This topic was modified 2 years, 11 months ago by
-
August 2, 2006 at 8:30 am #9771
nusa dusa
ParticipantHi
I am a newbie in ethical hacking. I have good understanding of networks sysytems, web applications penetration testing but exploiting us a new era for me.
I am administering a couple of LAN s connected to each other through switches and routers. I had been using windows servers for most of the administering part, bur now i own a new macbook and i am willing to learn more about unix environments.
I ve read your article and i am amazed how easy it is to exploit a windows system. Although it seems easy i could not manage to use the exploit mentioned in your artile.
The exploit you use is “ie_createtextrange” . This exploit is available in .pm ( perl module ) format . In metasploit exploit pages they say all i have to do is to copy this exploit into exploit directory. But all the other exploits ( default ones coming with installation of alpha 3) are in .rb ( ruby ? ) format.
So when i type use ie_createtextrange in msfconsole i get an error. Do i have to compile .pm into .rb , if so how ?
I am sorry if this seems to be a very stupid question but i am really new to perl, ruby, unix darwin enviroments.
Thanks in advance for your response.
-
August 2, 2006 at 1:25 pm #9772
Anonymous
Participantthat exploit is for MSF 2.x you need to install that if you want to run the exploit, i dont know if it has been ported to MSF 3 yet.
-
August 2, 2006 at 3:59 pm #9773
nusa dusa
ParticipantYes but not just that xploit is in .pm format, all others on the site are same .pm not .rb ???
-
August 2, 2006 at 11:42 pm #9774
Anonymous
Participantthat is correct, the ruby ported exploits are bundled with the MSF v3 package.
-
November 10, 2006 at 5:14 am #9775
slimjim100
ParticipantVery good Article!! I have done some thing similar with a Soekris SBC and Monowall. I have also see people just APR Poison a network (like with Cain & Able) and steel the info and traffic that way. WiFi has a lot of risks to it and when you add Spoofing, Phishing, and Fake AP’s it can only confuse normal users.
Slimjim100
-
March 26, 2009 at 9:43 pm #9776
apocolypto
ParticipantWell, I understand that I am a little late to the party as this thread is over two years old, but as they say better late than never! 🙂
I have noticed that the creators of softAP no longer make/distribute this product. Is there a functional equivalent? Since I am new to all of this I am going back through old articles and trying to recreate some of these things so I gain a better undertanding of how they work and their limitations.
Best defense is a good offense right? Boy, I am full of adages today 🙂 If anyone has any suggestions I would be most appreciative. Also it would need to be in Win Xp platform
Last but not least, thank you for a well written and informative article! It makes me sad to think that a few months ago, all of a sudden there was a “free wifi access portal” in our neighborhood that disappeared after a few weeks. Guess now I have an idea of what it was and what happened. -
April 2, 2021 at 6:56 pm #179577
teragoodness
ParticipantFinally! A great way to hack Wi-fi networks.
-
-
AuthorPosts
- You must be logged in to reply to this topic.