Cracking Wi-FI passwords...NOT USING BACKTRACK

I am using opensuse 12.3. I want to learn to crack the wifi passwords using opensuse.I searched the forums but there was nothing relevant and concrete.i searched google but backtrack is the only option i see. i have sound knowledge of networking terminologies just to say that i am not a noob or newbie to hacking.i read one of the post regarding the same but it says that wifi cracking tool such as aircrack are blacklisted in repos…

So can anybody please guide me through the tutorial or direct me to a link that can help me learn to crack wi-fi passwords using ONLY opensuse…

On 05/14/2013 07:36 AM, brucewayne507 wrote:
> So can anybody please guide me through the tutorial or direct me to a
> link that can help me learn to crack wi-fi passwords using ONLY
> opensuse…

as far as i know we openSUSE users/folks/community do not support
the breaking down of locked doors, or breaking into locked cars and
going into places which are not ours to go into…similar idea on
cracking passwords.

if you know the password and have come by that knowledge legally,
use it. otherwise move on to a place which is OPEN and welcoming.

do not break down locked doors or bypass other owner placed controls.

or, let me ask: is you home/car/whatever free to be used, taken and
maybe resold by anyone who can figure out (with help from us!!) how
to get in, car-jack, etc???

these are my opinions, i do not speak for the openSUSE Community or
any of its sponsors.

stealing wi-fi is stealing. don’t do it…


dd

First of all, I wont call it breaking. If you would think this in larger terms (and I did specifically mentioned the word ‘learn’ and not ‘break’ ) this is more about exploring new possibilities. Who knows I may even invent a new security algorithm if I find any shortcomings in the existing ones. Linux, as far as I know,is globally acclaimed with the tag of FREEDOM. Freedom can definitely lead to new learning. How can anyone restrict you from learning?? If opensuse community users/folks/community (as you mentioned) do not support ‘learning’ then there is no difference between those people and government who suppress rights of the common people. Just because something is not ethical does not mean you are not suppose to know about it. Time has changed now. If you want to protect yourself you must know how strategies of the attackers.

I am not committing any crime. I am breaking MY OWN Wi-Fi protection;doing it in controlled environment. Just want to learn the traits of how others would steal it from me. I want to work in security domain so i thought learning it would not cause any harm.

I could have gone with backtrack but i am a proud user of opensuse and so i want my os to do the things just as any other distro would do. People claim opensue to be versatile, i thought of checking it out…

P.S.: I have no intentions of being rude but whatever I felt, I expressed…I respect people who dont break the locked doors but that doesnt mean people responsible to maintain the peace wont kill terrorists. If it is a need,then there is no ifs and buts…

If you want to do penetration testing on your own network then take a
look at tools like rapid7/metasploit which has a gratis version. I am
sure there are many other tools I do not know.
If you want to be serious about learning security by learning about how
to crack things take a professional training, in some countries
including where I live it is even illegal to own and use certain tools
if you are not officially certified.
More than that I will not comment.


PC: oS 12.3 x86_64 | i7-2600@3.40GHz | 16GB | KDE 4.10.2 | GTX 650 Ti
ThinkPad E320: oS 12.3 x86_64 | i3@2.30GHz | 8GB | KDE 4.10.3 | HD 3000
HannsBook: oS 12.3 x86_64 | SU4100@1.3GHz | 2GB | KDE 4.10.2 | GMA4500

I am using Opensuse 12.3 and I want to LEARN how to crack Wi-Fi passwords. I have searched forums but could not find anything relevant. I did try Google but the result were only through the use of Backtrack. I also found out that tools (like aircrack) are blacklisted in the repos of opensuse. So if anyone could just help me through the steps or tutorial it will be great!!!

I want to learn the cracking only through opensuse. I am aware of networking terminologies.

PLEASE NOTE:
This is just for learning purpose. I DO NOT INTENT TO BREAK ANY LAWS.
This is NOT FOR STEALING anybody else’s password. I shall use the techniques on MY HOME WI-Fi only.
I want to pursue a career in security so learning cracking will be beneficial as I will learn the traits of exploiters.

Please do not double post.

You other post is under survey. I hope adecission is reached very soon.
This oen is CLOSED.

On 05/14/2013 08:56 AM, brucewayne507 wrote:
>
> I am using Opensuse 12.3 and I want to LEARN how to crack Wi-Fi
> passwords. I have searched forums but could not find anything relevant.
> I did try Google but the result were only through the use of Backtrack.
> I also found out that tools (like aircrack) are blacklisted in the repos
> of opensuse. So if anyone could just help me through the steps or
> tutorial it will be great!!!
>
> I want to learn the cracking only through opensuse. I am aware of
> networking terminologies.
>
> PLEASE NOTE:
> This is just for learning purpose. I DO NOT INTENT TO BREAK ANY LAWS.
> This is NOT FOR STEALING anybody else’s password. I shall use the
> techniques on MY HOME WI-Fi only.
> I want to pursue a career in security so learning cracking will be
> beneficial as I will learn the traits of exploiters.

If you really want to be proficient at this kind of security, AND your motives
are really pure, then a first step would be for you to be able to build and
maintain your own set of tools within the laws of the country in which you
live
. For really good reasons, we will not provide any help.

I do have some expertise in wireless, and my rules are as follows:

(1) WEP is not much better than no encryption.
(2) WPA1 can be cracked. It requires some effort, but it can be done. A
non-dictionary passphrase is essential.
(3) WPA2 Personal is very difficult to crack if a long non-dictionary passphrase
is used. Mine is 28 characters in length. It is a pain to have to enter, but it
is chosen logically so that I do not have to write it down.
(4) WPA2 Enterprise is best as long as the server is robustly protected.

Both threads are unlocked/opened. They are merged now and the double post of the OP is deleted to keep things readable.

This is discussed in the staff.

We will allow a discussion about security, but we will not allow a discussion on how to crack. The last would be against our T&C.

Disappointed but not discouraged…
I respect your policy and I will abid by it as well…
Will surely find a way on my own…

On Tue, 14 May 2013 18:16:03 +0000, brucewayne507 wrote:

> Disappointed but not discouraged…
> I respect your policy and I will abid by it as well…
> Will surely find a way on my own…

I think you’ll find that most places will discourage discussion activity
that is illegal in most jurisdictions. This falls into the same category
as talking about using Bittorrent to share copyrighted stuff illegally.

And in parallel to that example, we certainly can help people understand
how to use Bittorrent to download (for example) the openSUSE ISOs because
that is legal (and encouraged). But we’re not going to tell you where
to go to find your favourite “warez” and illegal movie downloads.

Providing a tutorial on how to crack wireless security would not be
overly responsible of us, any more than creating a virus creation toolkit
would be. Security isn’t implemented through obscurity, but if you really
want to learn, learning takes more than being given a “how to”, it
involves understanding the principles of wireless security at a
fundamental level. Understanding key exchange algorithms and methods, for
example, is a broader discussion about security we can have here.

Jim

Jim Henderson
openSUSE Forums Administrator
Forum Use Terms & Conditions at http://tinyurl.com/openSUSE-T-C

On 2013-05-15 00:32, Jim Henderson wrote:
> On Tue, 14 May 2013 18:16:03 +0000, brucewayne507 wrote:

> Providing a tutorial on how to crack wireless security would not be
> overly responsible of us, any more than creating a virus creation toolkit
> would be. Security isn’t implemented through obscurity, but if you really
> want to learn, learning takes more than being given a “how to”, it
> involves understanding the principles of wireless security at a
> fundamental level. Understanding key exchange algorithms and methods, for
> example, is a broader discussion about security we can have here.

openSUSE contains a tool that tries to crack every user’s password,
named “john”. If I remember correctly, it is a software and large
dictionary packaged separately. It is used by the security weekly cron
job “seccheck” if john is available.

It is hugely cpu intensive. I tried it once for curiosity, and had to
remove it after perhaps a day running 100% CPU.

IIRC, if it cracks a password, it emails the administrator and the user
involved - I’m not sure if it actually tells you what the password is,
because the purpose is security, not cracking.

As it is included in the OBS official release, I have to assume that the
package has been accepted by the SUSE legal team.

I’m not interested in cracking a WiFi, but I do know that there is at
least a Linux distribution that specializes on doing it (aircrack?). I
assume that the purpose is finding out if there are weak setups in your
company, not to break them, and then advise the people responsible to
strengthen them.

I’ve never used it personally. Owning such tools on some countries is
illegal (Germany?), but I believe that even a network sniffer can be
illegal there.

And even if the tool is not illegal in some countries, using the cracked
password should be illegal anywhere, and if not, highly unethical in any
case.

If you are interested in the technical security aspects of wireless and
other setups, I’m sure that there are communities dedicated to this
(high math knowledge required). Again, I assume that the purpose is
discovering vulnerable encryption algorithms and improving them in
consequence. It is possible that these communities are closed, not
public. Some legislations might require the people doing this to
register with the authorities.

For example, WEP was proved vulnerable; you can find more details in the
wikipedia, and the software used for this (aircrack-ng). The end result
was the development of better methods.


Cheers / Saludos,

Carlos E. R.
(from 12.1 x86_64 “Asparagus” at Telcontar)