Archive for the ‘Information Security’ Category
A new project of projects! This new Live DVD will be optimized for WiFi-GPS-Bluetooth-Radio hacking.
WEAKERTH4N will continue to grow, but I will be focusing more on WarcarrierOS.
“This is a Wireless Professionals live disk. Here are the very first publicly available screen shots. I created scripts to display on-screen stats for WiFi, Bluetooth and GPS – just like the curses WARDRIVING application. I have patched and tested the Linux 3.7.10 Kernel with AUFS3.7, compacted custom CUDA 5.0 libraries, CUDA enabled cracking software, NVIDIA 310.x drivers, Radeon, Intel GPU drivers, bleeding edge compat-drivers and kernel compiled wireless drivers, smarter driver loading for different system configurations, my own ACPI scripts and key bindings for mostly all laptops, including support for Apple users, gcc 4.9, GPSd 3.2, mostly all of the latest wireless hacking tools and exploits (each one compiled and tested), spectrum analyzer support for 802.11, and loads of wireless administration and analysis software.
This project has been my dream for years. I wanted to bring together GPS, WiFi, Bluetooth, wireless (not just WiFi) hacking and, most importantly, wireless administration into one obsessive, finely tuned, polished and neatly packaged disk that is moderate in size.“
The Warcarrier application as has been re-coded and optimized for laptop screens and I have removed the bug from trying to load the files in FireFox (still not sure why that browser cannot open files with “:” in the name) which will be released tonight as a new version on the Google code page for Warcarrier. FreeRADIUS-WPE+Hostapd+ath9k works flawelessly for capturing WPA2Enterprise credentials right form the live disk. Also, I will upgrading and releasing to Google Code the WPA Phishing Attack.
I have also purchased a new 25dBi Yagi WiFi antenna and a converter from mini N to RP-SMA to test with the SR71e radio. The 14dBi panel antenna had a nice reach of about 1mi (5280ft) from the side of a mountain, across the Monongahela river right to my campus
Here is the view from behind the antenna:
Here is another clear view down to my campus with the antenna’s tripod:
The signal strength was excellent and had little trouble. This antenna was used with an ALFA 1W (claims to be 1000mW anyways (tx)). The ALFA WiFi adapter and it’s poor RTL8187 driver and RealTek radio were the worst adapters I have used in my experience with WiFi hacking. I will expand more on this topic when I do testing with the Atheros (ar9280) ath9k-based SR71e.
This weekend I will be purchasing an Ubertooth (for Bluetooth scanning and sniffing in passive mode) and will be installing drivers and writing code for the drivers for WarcarrierOS which may get integrated into the Warcarrier application. As of now, only probe requests are used by the Bluetooth devices and Net::Bluetooth – which is considered “active” scanning. “Passive” scanning is when the radio just listens, in which it can “hear” in a more stealth-like fashion.
The last release was broken due to the Linux 3.8.X kernel not playing well with unionfs – which is pretty lame. Also there was an awful Java fonts bug that ruined dpkg. I was able to fix both and rolled the kernel back to 3.7.10 which has been tested on USB and working properly with Unetbootin. The newer kernel makes the ISO smaller. So, I present to you, version 1.9!
Download from HaxRadio:
FreeRADIUS-WPE with WEAKERTH4N Instructional Video: Easy! :D
dragon brought to my attention that I accidentally left ssh running on port 23. To stop it, please open the file:
and edit the following light blue line:
to have a “#” pound symbol in front of the line to make it just like the rest of them – essentially commenting this out.
Then we need to restart inetd
It will be disabled in the upcoming BETA 2 release this weekend.