Related
I wonder if anybody could help me? What it is, is that I am disabled. My fingers are paralysed, and so working the intricate parts of the XDA is quite difficult. It is not impossible, but it is hard.
I also have several friends who are in the same situation as me. 12 months ago they were given xda 2 each for free. None of them have used them much because they are difficult to use, because they are stuck in their ways, and because I don't think they really realise the full potential of these little devices. It has took me 12 months to get hold of one of these, but just within a few days I'm quite bowled over with the potential.
So I wonder if somebody would be prepared to lead me through making the most of my XDA, with my disabilities, so I can also share this knowledge with the other disabled guys who also have this Pocket PC?
The first thing I want to do is set up the basic software, to maximise connectivity with my home network. I have already started this, and had some help in this direction on this forum, but I am still a bit stuck.
I have loaded this Pocket PC software onto my xda 2 http://forum.xda-developers.com/viewtopic.php?t=17410&highlight=jojo . I have windows XP on my desktop computer. This is hardwired to a 3Com wireless router. I have bought a SDIO wireless LAN card. When you install the software, it virtually sets its self up, the connection displays itself, you select it and have a choice between a Internet connection or a work connection. If I choose work, I am able to connect to the Internet and surf the Internet, but I am not able to do an active sync. I have gone into my start menu/settings/connections/network card/network adapters/socket WLAN SDIO V1 driver /name server and set the WINS to the IP address of the computer I want to connect to as somebody suggested to me, but it doesn't work. I also cannot see the other shared directories on my computer's on the network. (I do have Norton security on, but I have tried these with Norton security disabled.)
Can anyone make a suggestion?
Thanks in anticipation, funny keyboard.
Guys.....
I find lot of prepaid wifi network in hotels, restaurants, etc. in order to join the network, I must register with user name & password that will be given by the provider if I paid certain amount of money.
I just wondering is there a way to hack prepaid wifi?
thanks
You will need this l33t t00l: m0n3y.
I remember this was discussed long time ago...
as I recall, you can't do that using WM phone, neither a windows laptop..etc.. you need Linux OS and some special tools...and even though it's possible, it takes very long time 1-2 hour to break the password (according to the encryptions of course)
try to search the forum, you might end up with that thread
I cannot believe how often companies just use the same username and passwords.
You actually crack some networks in 40 mins.
using something like CommView® for WiFi PPC or Airscanner Mobile Sniffer can help in that process.
None of the above techniques will work since the companies use a form of IP Tables.
THE only way is to tunnel with DNS using something like NSTX, but its very alpha. (Easiest way to test if technique works is by trying to ping a website and see if it returns the correct IP address)
The technique is there, just needs a good coder and some time..
Tunneling over DNS. That's clever. But all the commercial hotspots I've ever used resolve every IP address to the login/order form page when you aren't already logged in. That is, you can't tunnel through DNS.
The methods that take "40 minutes" to crack the encryption are talking about something completely different - finding the WEP or WPA keys for a network that has security enabled. It wouldn't be useful for prepaid hotspots, as they generally do not use WEP or WPA encryption. Instead, they let you associate and get an IP quite easily. Then they direct you to the credit card order form.
One method that can be used on some of them is to spoof the MAC address and IP address of an authorized, logged in client. However, you will quite literally steal their internet access, as that client will be knocked off the network. I've done this myself but it doesn't seem to work anymore on any of the big networks like T-Mobile (in Starbucks).
Best bet is trying to find a vulnerability in one of the web applications running on the server. All the layer 2/3 stuff is pretty well locked down.
fluxist
They will resolve but wont actually PING, thats due to IP Routing Tables.
There is no way to crack wifi password for pocket pc and laptop centrino main board. And you need special wirelless hardware. Must be pentium 4 or above.. Airsniffer and other proğrams can helpful. its change on WEP or WAP protocol. WEP is the most hard. You can find how to crack on forums and videos on youtube
^ That is rubbish.
Centrino or not, it has nothing to do with it.
Its all down to the wireless card and whether or not it accepts mode monitor/master.
Its WPA not WAP and WPA is far harder than WEP due to having to be brute forced, unlike WEP which has the well known RC4 weakness.
I think he is referring to the fact that one cannot do promisc mode on PPC, so they can never collect the packets to try and compute a WEP key. And also the fact that on Centrino Wifi cards (2200BG, et al.) the linux drivers cannot due packet injection in promisc mode. However, this limitation is overcome in some recent patched drivers. See the Backtrack linux live cd (www.remote-exploit.org/backtrack.html) for details.
fluxist
I don't think there is a hacking tool for ppc which is too very effective or complete...
All so called cracking tools for ppc are buggy little ****s...
Aircrak ng is best for PCs ... em waiting 4 a version of it on ppc...
Hmmmm.... That would be very interesting if they came out with an application to crack WEP and WPA networks I could see WEP being cracked but not sure about WPA since WEP is extremely easy to crack usually in about 10 minutes or less depending on the strenght of the signal, but WPA is much more difficult since it requires a brute force attack. I'm not so sure that our phones are capable of that.
You are waisting your time thinking of this with a phone as the Colleting of packets will take so long and PPC don't support packet injection and you would be limited to WEP
Get your self a net book that supports CUDA then you stand a chance Google CUDA Brute Force
i can buy a pin to accesses it but i cannot sharing it via hotspot how can i share it
Does anyone know where i can get a WEP crack app for my diamond plz?
interested too - diamond cracker
aka nutcracker
why would you need one have you forgotten your password and cant log into your router.
Would amount to theft if you get onto someone else router to use thier wifi.
HyperFire said:
why would you need one have you forgotten your password and cant log into your router.
Would amount to theft if you get onto someone else router to use thier wifi.
Click to expand...
Click to collapse
bit more serious than theft IIRC.
and very easy to find the person doing it....
BAD IDEA!
I'm sure this isnt the case but if you cant get into your own router, do a factory reset and set it back up.
HyperFire said:
I'm sure this isnt the case but if you cant get into your own router, do a factory reset and set it back up.
Click to expand...
Click to collapse
^^ and if u dont know how to set a router up, WTF are u trying to crack a WEP?!?
bad Idea! In uk people have been persecuted for this and would agree it is very easy to be caught!!! would send the captured packets to a backend server to be processed as the diamond would struggle anyway
kevinking2020 said:
Does anyone know where i can get a WEP crack app for my diamond plz?
Click to expand...
Click to collapse
I have done some research into this subject, though I haven't found any good solutions to this, this is what I learned:
The main problem in cracking a wep key on the diamond is the limited process power of the ARM processor. It could take hours to do a successfull crack decryption with this processor.
A solution to this, could be to have packet sniffer running on the diamond, which would relay the captured packets to a remote server that will perform the actual crack, then sms the passkey to the user.
Another option is to do a brute force on your wep. For this you need an app that will assist you in this and a so called "rainbow" file which needs to be localized to include all used chars in your language. Such a rainbow file is about 1GB in size, so in this option you would need to consider the memory speed of the diamond divided by the speed of the phones NIC.
Though I haven't tested either method, I find it impractical to use the diamond for such purposes since it will be too slow. For any practical use, you would want it to be instant. You won't hang around the same place long enough to do a successfull crack.
I hope this post isn't violating this forum. This isn't meant as a guide to the above, just what I learned reseaching on goolge.
Gulle69 said:
I have done some research into this subject, though I haven't found any good solutions to this, this is what I learned:
The main problem in cracking a wep key on the diamond is the limited process power of the ARM processor. It could take hours to do a successfull crack decryption with this processor.
A solution to this, could be to have packet sniffer running on the diamond, which would relay the captured packets to a remote server that will perform the actual crack, then sms the passkey to the user.
Another option is to do a brute force on your wep. For this you need an app that will assist you in this and a so called "rainbow" file which needs to be localized to include all used chars in your language. Such a rainbow file is about 1GB in size, so in this option you would need to consider the memory speed of the diamond divided by the speed of the phones NIC.
Though I haven't tested either method, I find it impractical to use the diamond for such purposes since it will be too slow. For any practical use, you would want it to be instant. You won't hang around the same place long enough to do a successfull crack.
I hope this post isn't violating this forum. This isn't meant as a guide to the above, just what I learned reseaching on goolge.
Click to expand...
Click to collapse
not a violation as far as i know.
i takes hours to crack a WEP encryption using the latest PC! remember, WEP encryption for Wireless networks (as long as is set to 128bit) is the same encryption used by banks!
if it was that easy to break, then all the banks would be buggered
is the a tool, that can collect the data packets.
and than you copy the file to your PC an crack it there, maybe with aircrack??
so that you use only your phone as pocket collecter!?
kevinking2020 said:
Does anyone know where i can get a WEP crack app for my diamond plz?
Click to expand...
Click to collapse
there aren't any "wep cracking apps for diamond". only ppcs with linux os can crack wep, but it's not as easy as you think.
Yes, there is lots of false information in this forum. It is not illegal to crack WEP keys (as long as it's your own network) and many people do this for testing their networks security. Banks most certainly should NEVER use WEP. It is not safe and it can be cracked in minutes using a PC. they do this by replaying traffic back while monitoring it. Usual causing connected users to briefly disconnect and then recording while the reconnect again.
Unfortunately it is true that most of the best tools are on linux only and I have only seen one promiscuous network sniffing program for the diamond.
I don't find it impossible but nobody's put the time in to make this happen.
I do agree with Gulle69, the processor is limited which would make the calculations for cracking the WEP impractical on the diamond however it's network sniffer could collect all key packets and exports them to a PC for cracking and return the results. It typically takes about 100,000 weak IVs to be be able to recreate the actual WEP key.
I am not sure but the diamon wireless chipset can not be in monitor mode like you do in linux for cracking WEP. Cracking WEP key is usefull when you try to demonstrate to your companie that a WEP key is not security and they need to change for a stronger solution.
mugglesquop said:
i takes hours to crack a WEP encryption using the latest PC!
Click to expand...
Click to collapse
i had a play a little while ago with my asus eee, set my router to wep, and set a half decent password.
following a tutorial and using packet injection i managed to get my key back within 10 minutes (most of that time was spent reading the tutorial).
having said all that i agree. with low power processor and lack of packet injection you wont get very far with a pda for the time being.
not really
mugglesquop said:
not a violation as far as i know.
i takes hours to crack a WEP encryption using the latest PC! remember, WEP encryption for Wireless networks (as long as is set to 128bit) is the same encryption used by banks!
if it was that easy to break, then all the banks would be buggered
Click to expand...
Click to collapse
I've seen WEP cracked in 5mins, it is nothing like what they use in banks. Trust me.
That being said, I agree it could be done by relaying packets to a computer, but why would you even want to do it on your phone? To "show off"?
mugglesquop said:
i takes hours to crack a WEP encryption using the latest PC! remember, WEP encryption for Wireless networks (as long as is set to 128bit) is the same encryption used by banks!
if it was that easy to break, then all the banks would be buggered
Click to expand...
Click to collapse
Banks use different encryption algorithms, which makes it a lot harder to crack. WEP can be cracked pretty easily if you know how to crack it.
Even if you make it a 12903182309218309218 bit encryption using WEP, it would still be easily cracked. WEP Cracking programs don't use brute force. Brute force hacks take ages because of the combination of keys. WEP cracking injects and monitors packets for the password itself.
If banks used the same protection WEP to secure their wireless networks..... we'd all be in trouble~!
Can read this if you are interested in somebody cracking 128bit WEP within 60seconds!
http://www.shawnhogan.com/2006/08/how-to-crack-128-bit-wireless-networks.html
There is a programm that can sniff the packages with your phone and why shouldn't it be possible to crack with your phone a wep-key?
I think it's possible, the hardest thing is to capture the packages. There is a paper to crack a 108 bit wep key in under 60 seconds!
http://www.cdc.informatik.tu-darmstadt.de/aircrack-ptw/
When i have more spare time i'm going to try to write such app...
This is a legit question,
I would like to try to hack my own network, just to see how easy it is.
It's called "Ethical Hacking" there's a book by the same name, and a web site too i think.
"Pen" testers get paid to do it, my dream job, maybe.
Jim
I can crack any WEP key (64 or 128 bits) within 10mns.
I've done that many many times but with aircrack runing on a Laptop.
The only required thing is to have some traffic on the wifi you want to crack.
With the last versions of those tools, performance of the machine is not an issue...
I think the harder is to figure out to inject packet to the router from the diamond.
On Pcs, only a few chipet can do that.
Good luck for developping....
there is a program out there had it on my old ppc. found it on the net. but can't remember the name of it to save my life. it was for testing security of networks. but also could be used in reverse.
Hi, thanks in advance for help.
I have someone leeching off my Wifi net, who seems to be able to 'break-in' no matter how i secure the WiFi net.
Anyone know of any free Windows Mobile software that will show signal strength of Wifi CLIENTS nearby. Not Access Points, but CLIENTs.
I want to go find this guy.
thanks
Hi there!
If you got an "leecher" on your network I would recommend you to start your search on your router.
You didn't provide any specs, how did you find out that someone is on your network?
Next question, have you changed both, router pass and wlan key?
Are u using weak encryption (wep)?
Whats about your mac-filter?active?
I would guess you've got an dhcp server on your network/router... go there and check the dhcp releases. Any suspicious entrys? You should know all the devices listed there. If you have found a IP you don't know, ping it and check if its alive (those packages can be ignored by the host), try to access it via smb, you could also try a demo of languard and try to read out details like os, user, owner...
I'm almost shure you can't use your wm device to locate a client of a network, unless you can switch your wlancard to ap-mode and he connects to you ^^
Nope, need signal strenght reader if poss.
Thanks for the comment, but I'm pretty security savvy, and have done most of what you recommend.
I actually can't believe he's still getting in when I've locked down so tight.
Anyway, it's a CLIENT signal strengh program that I'm trying to find.
Rogue clients are malicious wireless client devices that either try to gain illegitimate access to your WLAN or try to disrupt normal wireless service by launching attacks. There are numerous ready-to-launch wireless attack tools freely available on the net. Many of them are open sourced and work pretty well with most Wireless client cards. This turns any curious mind to professional hacker in minutes. Many do it simply for the pleasure of being able to disturb someone remotely. All these developments force WLAN administrators to give a second look at any wireless client that is misbehaving.
What means most of that what i recommended?
Did you actually change the router password AND the wlan key?
Sorry, I don't think that you can trace him with your mobile. as long as hes not connected to your mobilephones wireless network (wich requires your mobile wlan device to switch to ap-mode).
Forget about that.
Please tell us, why do you think somebody is on your network, how did you find out... whats the "evidence" for you that there is somebody.
I'd like to help u, but i need some further details to lock him out.
I hope you know that its just a matter of minutes to break a wep key. GPUs are used to decode it, which is damn fast!
So please provide more specs about your network.
Greetings
1: Use WPA instead of WEP.
WEP is crackable in a matter of seconds.
2: Assign access control/MAC filtering
3: Use your network in ad-hoc mode
Well, WPA is crackable too.
The person in question might change his MAC to yours and create collisions anyways
Can you be sure that he has really associated with your router. I have noticed some client/router combinations "apparently" associate but all traffic is blocked because they did not provide the right key.
As others say - use WPA WPA2 and use a strong (non dictionary) passphrase
get a computer that can run airodump or something similar.
run airodump with it set to the channel of you router - not in hopping mode as you will miss lots of packets.
Airodump will tell you the strength of the signal from his computer so if you have this on a laptop you can move around and possibly can an idea roughly where he is
Thank you, i will try Airodump
Thanks in particular Scote.
I didn't list the router config simply becuase I am confident it's pretty secure:
Router is a new Belkin N1
- 63 random char password from grc.com/passwords
- SSID is "netgear" even though its a Belkin : intention to mislead for access URL.
- WPA2-PSK AES encryption
- SSID not broadcasting
I didn't bother with MAC filtering, as I understand a good 'hacker' can spoof it : If this guy can get through WPA2 I would say he can probably MAC spoof.
My 'evidence', is that up to 3 unkown computers turn up on the 'Clients List', around 4 hours after I change the SSID/password : Each time.
I have 2 laptops, so I will try Airodump or maybe Backtrack (suggested elswhere) on these as a 'direction finder' based on signal strength.
Hmmm...I did read somewhere you can set a Kaiser to be an access point...
Thanks all
Yes you can.
Someone found his stolen Wii/mobile phone (don't remember which one) that way.
There was even an article on the net.
Just bought a HD2. Nice piece. But however 2 things bother me.
The windows market place is just a joke compared to iPhone. Is there any other place where we can source application. Surely there must be more than just those 150 apps ?
Second, I must with humility confess that I have not been able to connect my HD2 to my Wifi at home. He does offer the Wifi. I enter the key but it won't connect. I'm assuming it might be because the IP adress hte phone is using but I have not been able to change.
And on top my wife is having fun because with her IPhone she was able to connect very smoothly.
Can the more experienced elder of this forum guide the new comer that I am. Have to admit that the user manual is a bit short on the technical side.
Thanks...
you dont have to use the marketplace, googling will bring up thousands of apps and games
i agree its a little annoying about the windows marketplace but iphone is a money making tool for apple via itunes! 80% of there apps are total bollox and have been created to make a quick buck for some 14 year old wannabe designer!
Just search via the web and you'll get the apps you want
regarding you wifi it does sound very strange as my phone connects instantly to my router and took me 10 seconds to set up. Please dont be put off by the HTC as i assure you the connection issue will be a simple get around.
Try restarting your router if that fails then go into your router settings and change channel on the wifi signal or just basically have a play around!
WiFi security
Hello,
just an idea:
what security connection have you got on your WiFi router? Mine was WPA2 and it didn't work, changed it to WPA-PSK, TKIP and it works...
I hope I helped!
Michele
whensetting up wifi (this applies to wep encryption, if you are using wpa then ignore this) it is important to know that your routers authentication can be set to "open" key, "open or shared" key, or "shared" key.thing is your phone can only be "open" or "shared" key. in theory if your router is in "open or shared" the phone should be able to be set to "open" or "shared" but in practice I have never seen a winmo connect correctly inn this circumstance.
go start settings menu all settings connections wifi networks and double c check the encryption settings properly match your router settings.
(open key doesn't mean no encryption)