• KENNY_LOGIN_LILLIAN@lemmy.world
    link
    fedilink
    English
    arrow-up
    16
    ·
    4 hours ago

    i installed a kali linux vm and nmap, wireshark, tcpdump, and metasploit cuz i wanna be teh 1337 h4x0r i wanted to be when i was a 15 year old in 2001

    • BeardedGingerWonder@feddit.uk
      link
      fedilink
      English
      arrow-up
      1
      ·
      19 minutes ago

      Had a friend who wrote his french oral presentation out in 1337, he was allowed notes but not the word for word presentation. He showed the teacher beforehand, she said that’s fine, looks like gibberish.

    • poweruser@lemmy.sdf.org
      link
      fedilink
      English
      arrow-up
      1
      ·
      38 minutes ago

      I did that too, but back then it was called Backtrack Linux. I bought a special Atheros chipset WiFi card for my laptop’s PCMCIA slot. The built-in 802.11b WiFi card worked under Linux but only by using the Windows ME driver in NDISWrapper, which didn’t support promiscuous mode.

      The Atheros chipsets could be configured (by flashing the firmware with a blob I got from a BBS, if I recall) to capture the traffic from nearby wireless networks. In particular, I wanted to pick up the signal from when a device first connects. There was a bug in Windows XP that could cause the WiFi to drop briefly, then promptly reconnect. By triggering that bug over and over I could capture a lot of reconnect packets in a short time frame.

      Then I’d save the data to a big file and pipe it to Aircrack and extract the Wired Equivalent Privacy password.

      I was a 1337 H4XX0|2 B-)

      Tap for spoiler

      Well, that’s how the tutorial said it would work anyway. I actually never could get enough packets captured. The signal strength was too low