Friday, July 13, 2007

Introduction to Aircrack-ng


When i write about this, i feel happy, you know why/ because with this tools i have been very success. now let learn this.

What is Aircrack-ng ?

Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools. In fact, Aircrack-ng is a set of tools for auditing wireless networks.

Aircrack-ng is the next generation of aircrack with lots of new features:

  • Better documentation (wiki, manpages) and support (Forum, trac, IRC: #aircrack-ng on Freenode).
  • More cards/drivers supported
  • More OS and platforms supported
  • New WEP attack: PTW
  • WEP dictionnary attack
  • Fragmentation attack
  • Improved cracking speed
  • Capture with multiple cards
  • New tools: airtun-ng, packetforge-ng (improved arpforge), wesside-ng, easside-ng, airserv-ng, airolib-ng, airdriver-ng and airbase-ng
  • Optimizations, other improvements and bug fixing

Tuesday, July 10, 2007

Hidden SSID,Ampuh kah?

Salah satu langkah pengamanan yang biasa banyak dilakukan para admin adalah mematikan fungsi dari SSID (non broadcast) tujuannya apalagi agar ssid tidak terbaca oleh para wardriver.

Nah yang jadi pertanyaan cukup efisienkah langkah tersebut? Jawabannya pasti TIDAK.

mematikan SSID biasanya hanya berdampak bagi pemula yang memakai wireless zero windows saja. karena WZC windows tidak mampu menngkap ssid yang terhide, namun sekarang aplikasi wifi monitoring seperti netstumbler sudah mampu menangkap, menganalisa serta mencapture SSID yang terhide sekalipun.

Meskipun demikian Memang ada benarnya juga agar langkah ini tetap dilakukan para admin jaringan disamping merubah default password serta rename kembali SSID dengan nama yang lain selain default pabrik.