basics of virtuall box vmwarePost Exploitation Hacking Course

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATION
Already a Member Login Here

Home Forums Courses Post Exploitation Hacking Course basics of virtuall box vmware

This topic contains 18 replies, has 9 voices, and was last updated by  cybermo 1 year, 12 months ago.

Viewing 19 posts - 1 through 19 (of 19 total)
  • Author
    Posts
  • #7195

    mehandi islam
    Participant

    Hello everyone here,thanx to cybrary team.i would like to get information about how to configure my virtualbox vmware player so that i can i get my wireless interface detected while attacking a wifi network.i don’t get wlan0 interface while using the “airmon-ng wlan0”

    #7403

    S.B.
    Participant

    Are you using Virtualbox or VMware Player? Is your wireless card an internal card or a USB external one?

    #7627

    mehandi islam
    Participant

    I am using VirtualBox and my wireless card is internal card

    • This reply was modified 3 years, 11 months ago by  mehandi islam.
    #7989

    S.B.
    Participant

    OK, then you could set a bridge between your wireless internal physical card and the virtual ethernet card. You can test the configuration browsing the internet within the virtual machine.

    Anyway pay attention to the fact that usually internal wireless card are not the optimum for wireless penetration testing, due to the lack of some needed functionality such as the capability to inject packets, to work in monitor mode etc.

    If you want to improve your skills in this field it would be definetely better to purchase an USB external card such as an ALFA card.

    #8315

    mehandi islam
    Participant

    one more question.i have a .cap file but dont have enough huge dictionary than how should i crack it.

    #8336

    S.B.
    Participant

    You could search for other dictionaries, or you could try using a program such “crunch” to create a file with all the passwords containing az-AZ-09-symbols-etc and deciding the max length of the password. This can be a really time consuming job and even precomputing password hashes you will need thousands of years to crack a long enough robust password.

    #9174

    Patrick
    Participant

    This is a great resource for dictionaries.

    https://wiki.skullsecurity.org/index.php?title=Passwords

    I have a very high success rate with rockyou.txt

    #9207

    mehandi islam
    Participant

    i have tried darkcode.lst ans rockyou.txt but it didn’t work for me.

    #9250

    S.B.
    Participant

    THIS is the problem with dictionary attacks. If the password used is not in your dictionary you will never succeed…

    #12201

    zack hero
    Participant

    nice information..

    #12205

    xMidnightSnowx
    Participant

    Go brute force, 99% success with 99 years waiting time unless you work with NSA or CIA or FBI xD, just kidding.

    Brute force takes time but has high rate of success.
    Or Forensics Mode is the best. You can recover it and also decode the code if you have high level of Knowledge in that.

    Else , get a server and use that server just to crack that file while you live your normal life.

    — xMidnightSnowx

    #12530

    mehandi islam
    Participant

    i don’t think than, it is possible to crack wpa-2.i may provide you my .cap file,help me to recover the password.

    #12658

    CodFection
    Participant

    Yes, it is possible. But you have to use GPU to crack down the password as quickly as possible. otherwise there is a service online here https://www.cloudcracker.com/
    Hope you find it useful.

    #12670

    S.B.
    Participant

    Brute force is practically unfeasible on long, complex passwords. If you choose known passphrases, a dictionary or maybe a hybrid attack is your only hope. If you use a long (22 characters or more) complex, random password using a-z,A-Z,0-9,symbols etc the work factor is so high that you have more chances to win the lottery than to brute force it.

    @mehandi: if your .cap (or .pcap) file contains the 4 way handshake (actually it is not needed to have all the 4 phases…) AND your password is in my dictionary I will recover the password. Obviously I think you used a random long pass, so…

    Finally some time ago I read that there should be someone who should has been able to crack the WPA2 algorithm but the method is not publicly known at the moment.

    #20464

    Vodkanaut
    Participant

    Openwall [ http://www.openwall.com/wordlists/%5D is a good place to look for list as well.

    #25562

    mehandi islam
    Participant

    Thanx S.B.

    #25563

    mehandi islam
    Participant

    Sorry Friends for replying too late.actually i was busy in my semester exam.

    #45880

    usman47
    Participant

    Dude if the password is long or too complex brute force can take ages.

    #91549

    cybermo
    Participant

    🙂

Viewing 19 posts - 1 through 19 (of 19 total)

You must be logged in to reply to this topic.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel