Search:

Type: Posts; User: repzeroworld

Page 1 of 3 1 2 3

Search: Search took 0.01 seconds.

  1. Replies
    69
    Views
    47,444

    I'll work on the 32 bit version for linux after...

    I'll work on the 32 bit version for linux after compiling and testing for Windows 7 64 bit (Which is close to completion)...seems like the certain Javascript prototypes in the QtWebkit 4.0 library...
  2. Replies
    69
    Views
    47,444

    Bugs reported by "Kearns"... program now...

    Bugs reported by "Kearns"... program now recompiled to work successfully...presently working on windows version of the GUI for fun....
  3. Replies
    69
    Views
    47,444

    ***REBORN OF THE ADSTAR PROGRAM**** @St0ner199...

    ***REBORN OF THE ADSTAR PROGRAM****
    @St0ner199 and public

    I have re-written the program to include several options. You may be amazed of what you can do with the program now. I think also what...
  4. Replies
    34
    Views
    84,247

    @soother quick link to experimental version for...

    @soother
    quick link to experimental version for kali 2.0
    http://www.crazycodes.org/revdk3.html
    I have been focusing on all sorts of things lately.....nevertheless. I'll have to make some time to...
  5. Replies
    34
    Views
    84,247

    For those who are still using this script, I will...

    For those who are still using this script, I will do an update to it due to a new aircrack-ng.....the script and all my other scripts and upcomming gui programs will be found at this site...
  6. Replies
    69
    Views
    47,444

    Yes sed -nr '/^.{8}$/p;/^.{10}$/p' my_file ...

    Yes

    sed -nr '/^.{8}$/p;/^.{10}$/p' my_file

    or

    sed -nr '/^(.{8}|.{10})$/p' my_file

    using awk
  7. Replies
    69
    Views
    47,444

    here is a short pure sed technique (for only...

    here is a short pure sed technique (for only eight characters)


    sed -nr '/^.{8}$/p' my_file #find all lines with 8 characters in length only and output to terminal

    here is a a pure awk...
  8. Replies
    582
    Views
    931,602

    @wiire..great attempt!...I did a capture with...

    @wiire..great attempt!...I did a capture with wireshark and extracted the following details for my target
    ...
  9. Network Manager resets spoofed mac address but...

    Network Manager resets spoofed mac address but solution found
    Though I browse the web with a mac address spoofed with macchanger..I noticed whenever I disconnect from my AP and reconnected, Network...
  10. script works fine Defaultzero.. I confirm that...

    script works fine Defaultzero.. I confirm that Network Manager (version 0.9.4.0) is not affecting mac spoofing ,I Also tried this manually as follows

    spoofing mac...
  11. Have you tried changing your virtual box settings...

    Have you tried changing your virtual box settings for your adapter


    Settings==>Network==>adapter==>Attached to (Choose Bidged adapter option)

    There should be a label there known as...
  12. Replies
    582
    Views
    931,602

    Nice explanation of modulus arithematic...

    Nice explanation of modulus arithematic aspect...sorry dude i don't know C..hope someone with C experience and pentesting can contribute to this thread,,,I noticed in the Pixie Dust attack...
  13. Replies
    69
    Views
    47,444

    I am considering revising this python...

    I am considering revising this python program...will post the revised version when finished
  14. Replies
    34
    Views
    84,247

    thank you...I was thinking this line too but If...

    thank you...I was thinking this line too but If you do have or know of any updated algorithms that generates wps pin, send me a private message...I am also aware of the script wpspin.sh that use an...
  15. Replies
    582
    Views
    931,602

    Yes soxrok2212.I caught up focusing on the ...

    Yes soxrok2212.I caught up focusing on the modulas equation you posted for the Diffie-Helman process...As a result I was commenting on the probability of decrypting Diffie-Helman process using a...
  16. Replies
    582
    Views
    931,602

    the time taken decrypt the private keys (Private...

    the time taken decrypt the private keys (Private Random number) sent during the Diffie-Helman process depends on the prime modulus used (mod p in our case)...the biggger the prime modulus..the longer...
  17. Replies
    582
    Views
    931,602

    Ahh soxrok2212..this thread brings back memories...

    Ahh soxrok2212..this thread brings back memories ;)....when I struggled with bash..my first script....I am still making lengthy roadways in bash and python .thanks to this site====>stackoverflow.com
  18. Replies
    34
    Views
    84,247

    Thank you for your Wonderful contribution to an...

    Thank you for your Wonderful contribution to an alternative way of sourcing the mentioned packages..Attacks..which attack is best will depend on the degree of invulnerability of your victim's...
  19. Replies
    4
    Views
    11,592

    Just to confirm... you have tried downloading the...

    Just to confirm... you have tried downloading the ISO file through a torrent downloader such as Vuze/Bittorrent?..if so, check to see the number of seeders on the torrent network
  20. Replies
    7
    Views
    5,419

    The following links I find very helpful ...

    The following links I find very helpful

    http://www.tomshardware.com/reviews/wireless-security-hack,2981-8.html
    http://www.overclock.net/t/1256450/post-your-pyrit-benchmarks-here

    Best of luck
  21. Replies
    34
    Views
    84,247

    for bully try ...

    for bully

    try https://github.com/Lrs121/bully/archive/master.zip in your browser...you will see pop up box to download...after download..unzip and install

    for the timeout command...it is wise...
  22. Replies
    34
    Views
    84,247

    Thank you Get an update of all packages and...

    Thank you

    Get an update of all packages and install timeout command


    apt-get update && apt-get install timeout

    I don't know if Backtrack repositories are still being updated (cannot say if...
  23. Replies
    69
    Views
    47,444

    Yes. When you extract the downloaded tar file,...

    Yes. When you extract the downloaded tar file, there is a lengthy pdf document on how to install and use, with follow through screenshots. :D. alfa adapter==good choice
  24. Replies
    69
    Views
    47,444

    Wow..append function seems very innovative..you...

    Wow..append function seems very innovative..you mean like opening and existing word file and appending string of characters at begining or end of each word or using existing words in wordfile to...
  25. Replies
    34
    Views
    84,247

    ****************ReVdK3-r2 (Revision...

    ****************ReVdK3-r2 (Revision 2)********************************
    Download Link
    http://www56.zippyshare.com/v/UZrMxTtZ/file.html

    I have revised the script for those who prefer to use bully...
  26. haven't tried updating/upgrading during the...

    haven't tried updating/upgrading during the installation process but your results are very interesting...
  27. Great video..thinking about getting Nethunter...

    Great video..thinking about getting Nethunter soon :D
  28. Replies
    34
    Views
    84,247

    ReVdK3 script - updates

    I am working on incorporating bully wps pin cracking program in revdk3 script (95% completed)....I notice mac spoofing is affecting proper functioning of bully as compared to reaver (works well with...
  29. Replies
    69
    Views
    47,444

    Attention all adstar user..please leave feedback...

    Attention all adstar user..please leave feedback on other ways to improve the program.
  30. Replies
    10
    Views
    40,709

    Very interesting....

    Very interesting....
  31. good work joycelyn! I have the following...

    good work joycelyn!

    I have the following adapters connected to an outdoor antenna with an indoor 5W wifi amplifier



    1.AWUS036NH

    Good packet injecter
  32. hello Nick_the_Greek I haven't tested your...

    hello Nick_the_Greek
    I haven't tested your script as yet...writing such a lengthy script requires alot of work!..hope your script goes viral..haha!.:D
  33. Replies
    1
    Views
    2,675

    036h is compatible with kali linux... 1. Check...

    036h is compatible with kali linux...

    1. Check to see if 036h is actually an authentic 036h or the chipset is rtl8187:
    #airmon-ng (locate your wireless card and see what driver it is using...
  34. Replies
    69
    Views
    47,444

    RELEASE OF ADSTAR WORDLIST GENERATOR V1.2 ...

    RELEASE OF ADSTAR WORDLIST GENERATOR V1.2

    DOWNLOAD LINK

    http://www52.zippyshare.com/v/89300952/file.html

    WHAT'S NEW?

    adstar wordlist generator v1.1 was rewritten in the shortest codes I...
  35. I don't think the UEFI and Secure boot would...

    I don't think the UEFI and Secure boot would affect the installation process..the security boot feature would usually verify operating system (an installed operating system) or live image that it...
  36. Have you tried formatting your flash before using...

    Have you tried formatting your flash before using win32 diskimager? I was experiencing some setup installation problems but after i format my usb flash, i noticed that the installation process was...
  37. Replies
    3
    Views
    4,925

    I use Easybcd too...love this little tool....

    I use Easybcd too...love this little tool....
  38. Replies
    69
    Views
    47,444

    it is doable..i will look at it closer...one...

    it is doable..i will look at it closer...one reminder i noticed you said strings like "11aabbccdd" is useless.... the purpose of any wordlist generator is to generator all possible permutations, a...
  39. Replies
    69
    Views
    47,444

    hmm.not a bad idea..but any charsets whether...

    hmm.not a bad idea..but any charsets whether upper or low or numbers can be used with the string argument.it is also possible with this version to place a fixed string at any position in the word....
  40. Replies
    69
    Views
    47,444

    hmm...i was able to input some lengthy codes ...

    hmm...i was able to input some lengthy codes into adstar wordlist generator..
    These codes focuse on:
    1. Resuming adstar wordlist generator when piping - detecting the previous command line used...
  41. SECURITY MECHANISMS (LESS HTTP MORE HTTPS) There...

    SECURITY MECHANISMS (LESS HTTP MORE HTTPS)
    There are alot of website using https protocols instead of http..so if you are sniffing packets, you will find very few http packets and most of these...
  42. Replies
    69
    Views
    47,444

    hmm...everything has a limit :)....I'll leave the...

    hmm...everything has a limit :)....I'll leave the -l limit to 200..lol...very interesting question on stackoverflow and good answer..i have also love stackoverflow especially when something is...
  43. Replies
    3
    Views
    18,555

    Yes you can also use .txt files (windows OS...

    Yes you can also use .txt files (windows OS version of plaint text file) for piping into aircrack-ng..you don't really need to convert to .lst (Linux version of Plain text file).. just change...
  44. Replies
    69
    Views
    47,444

    TO NICK_THE_GREEK This was a python error...

    TO NICK_THE_GREEK
    This was a python error generated because of computation size of wordlist ..however for very large wordlist length of 200 or more was eliminated...the program will exit if this is...
  45. Replies
    69
    Views
    47,444

    I SEE YOUR POINT HERE.... Crunch wordlist...

    I SEE YOUR POINT HERE....
    Crunch wordlist generator have the same limitation.i suppose due to python's limitation (value calculation to large for python!)?...i will have to write some codes to...
  46. Replies
    69
    Views
    47,444

    funny command line......"-l137"??...lol

    hmm........what version of python are u using..i tried the following codes you gave me as follows:

    root@kali:~# adstar -b ':"' -e '<>' -s...
  47. Replies
    69
    Views
    47,444

    that's thorough testing!....gr8..thumbs up!

    that's thorough testing!....gr8..thumbs up!
  48. Replies
    69
    Views
    47,444

    Yes..good idea!....possible with generator...

    Yes..good idea!....possible with generator functions..i was thinking to add this feature in but decided to get the main features working properly...i will add this option in soon since it would be...
  49. Replies
    69
    Views
    47,444

    THANKS FOR TESTING WITH HASHCAT zimmaro..great...

    THANKS FOR TESTING WITH HASHCAT zimmaro..great work..:D
  50. Replies
    69
    Views
    47,444

    TO:NICK_THE_GREEK whenever i am doing an updated...

    TO:NICK_THE_GREEK
    whenever i am doing an updated version of adstar I WILL COMPRESS THIS WAY WITHOUT PATH DIRECTORY..CHEERS :)
Results 1 to 50 of 127
Page 1 of 3 1 2 3