So I go to college and the entire campus is covered by a WPA2 network. This WPA network requires a username and password. But the Nexus One only asks for a password. How do I connect to it?
That'll be WPA Enterprise. Normal WPA doesn't use a username.
It should work.. seemed to in my limited tests (I'm not running it now though as 90% of my wireless devices don't support it, otherwise I'd go back and check the settings etc.)
So does anyone know if n1 supports this EPA enterprise?
You pry need to talk to the IT guys on your campus and set it up as a vpn that should make it work.
no one has tried the nexus one on a college WPA wireless network?
WPA Enterprise (EAP-TTLS/PAP) works for me!
I didn't have to do anything special. On the first connection attempt my N1 set up a password to protect the credentials, and then asked for username/password. Worked flawless.
thanks you have eased my worries
I used 801.11x for security for mine to get it to work.
Volker1 said:
WPA Enterprise (EAP-TTLS/PAP) works for me!
I didn't have to do anything special. On the first connection attempt my N1 set up a password to protect the credentials, and then asked for username/password. Worked flawless.
Click to expand...
Click to collapse
Yeah it worked easily for me at my university. I actually have to write up the WPA2-ENT documentation for all Android 2.X devices. Yippee.
Good to know since the G1 doesn't support WPA2-Enterprise out of the box
Most of the universities I have been at used LEAP authentication. I have no clue if the nexus can connect to it though.
Related
Guys.....
I find lot of prepaid wifi network in hotels, restaurants, etc. in order to join the network, I must register with user name & password that will be given by the provider if I paid certain amount of money.
I just wondering is there a way to hack prepaid wifi?
thanks
You will need this l33t t00l: m0n3y.
I remember this was discussed long time ago...
as I recall, you can't do that using WM phone, neither a windows laptop..etc.. you need Linux OS and some special tools...and even though it's possible, it takes very long time 1-2 hour to break the password (according to the encryptions of course)
try to search the forum, you might end up with that thread
I cannot believe how often companies just use the same username and passwords.
You actually crack some networks in 40 mins.
using something like CommView® for WiFi PPC or Airscanner Mobile Sniffer can help in that process.
None of the above techniques will work since the companies use a form of IP Tables.
THE only way is to tunnel with DNS using something like NSTX, but its very alpha. (Easiest way to test if technique works is by trying to ping a website and see if it returns the correct IP address)
The technique is there, just needs a good coder and some time..
Tunneling over DNS. That's clever. But all the commercial hotspots I've ever used resolve every IP address to the login/order form page when you aren't already logged in. That is, you can't tunnel through DNS.
The methods that take "40 minutes" to crack the encryption are talking about something completely different - finding the WEP or WPA keys for a network that has security enabled. It wouldn't be useful for prepaid hotspots, as they generally do not use WEP or WPA encryption. Instead, they let you associate and get an IP quite easily. Then they direct you to the credit card order form.
One method that can be used on some of them is to spoof the MAC address and IP address of an authorized, logged in client. However, you will quite literally steal their internet access, as that client will be knocked off the network. I've done this myself but it doesn't seem to work anymore on any of the big networks like T-Mobile (in Starbucks).
Best bet is trying to find a vulnerability in one of the web applications running on the server. All the layer 2/3 stuff is pretty well locked down.
fluxist
They will resolve but wont actually PING, thats due to IP Routing Tables.
There is no way to crack wifi password for pocket pc and laptop centrino main board. And you need special wirelless hardware. Must be pentium 4 or above.. Airsniffer and other proğrams can helpful. its change on WEP or WAP protocol. WEP is the most hard. You can find how to crack on forums and videos on youtube
^ That is rubbish.
Centrino or not, it has nothing to do with it.
Its all down to the wireless card and whether or not it accepts mode monitor/master.
Its WPA not WAP and WPA is far harder than WEP due to having to be brute forced, unlike WEP which has the well known RC4 weakness.
I think he is referring to the fact that one cannot do promisc mode on PPC, so they can never collect the packets to try and compute a WEP key. And also the fact that on Centrino Wifi cards (2200BG, et al.) the linux drivers cannot due packet injection in promisc mode. However, this limitation is overcome in some recent patched drivers. See the Backtrack linux live cd (www.remote-exploit.org/backtrack.html) for details.
fluxist
I don't think there is a hacking tool for ppc which is too very effective or complete...
All so called cracking tools for ppc are buggy little ****s...
Aircrak ng is best for PCs ... em waiting 4 a version of it on ppc...
Hmmmm.... That would be very interesting if they came out with an application to crack WEP and WPA networks I could see WEP being cracked but not sure about WPA since WEP is extremely easy to crack usually in about 10 minutes or less depending on the strenght of the signal, but WPA is much more difficult since it requires a brute force attack. I'm not so sure that our phones are capable of that.
You are waisting your time thinking of this with a phone as the Colleting of packets will take so long and PPC don't support packet injection and you would be limited to WEP
Get your self a net book that supports CUDA then you stand a chance Google CUDA Brute Force
i can buy a pin to accesses it but i cannot sharing it via hotspot how can i share it
I've had the captivate about 24 hours now and dig it. I've rooted it and remove the att bloatware (per titanium backup), I've also performed a backup using Rom Manager.
I'm having trouble getting it up and running on an enterprise wireless what uses 802.1x PEAP authentication. I can get through all the auth. steps, and the device is assigned an IP, but I am unable to do anything that requires an internet connection; browser, market, etc.
Has anyone else ran into this issue?
*****EDIT*****
sigh i just realized that this is in the wrong area, it should have been over in development...i'm an idiot
I had a similar problem on a WEP-encrypted network, which I fixed by setting a static IP on the phone and then setting it back to DHCP (the correct setting). However, your problem could be entirely different than mine (not that I even am sure what my problem was, just that I fixed it!)
Best of luck!
Having the same problem on enterprise access points regardless of encryption. Home wifi netwroks work great (open and WPA2). Enterprise APs (open and WEP) connect and give me an IP, but will not transfer data. Think its a driver issue with the Wifi, it happens on every captivate ive tested, and seems to be more widespread than the GPS issue.
I have had the same issue with my work at work. I can get it to connect and get a ip but can not pass any data.
Sent from my SAMSUNG-SGH-I897 using XDA App
Had the same problem at work. Luckily I'm an admin and figured mine out. Our monowall portal was the issue. I can give a detailed answer for my problem tomorrow when I get to work.
I actually had the cap wiped to go back, then I literally figured out the problem. Thanks go out to my team mate for helping me talk through this.
Sent from my SAMSUNG-SGH-I897 using XDA App
can't wait to hear what your fix was!
Sent from my SAMSUNG-SGH-I897 using XDA App
This sounds more like your network not being allowing your device rather then the device having an issue.
it's been frustrating as I know two other guys with android devices that didn't have an issue. one is a droid eris running 2.1 and the other is a nexus one running 2.2.
Sent from my SAMSUNG-SGH-I897 using XDA App
designgears said:
This sounds more like your network not being allowing your device rather then the device having an issue.
Click to expand...
Click to collapse
Worked closely with my highly experienced network admin in my dept. for an afternoon (we had some time to kill). He checked the firewall and dhcp servers, ran packet traces, etc.
With what I'm experiencing, its the device. These wifi networks we use with Cisco APs are completely wide-open. All other phones and mobile devices have always worked great for years. We rely on this network for many custom applications and mobile tools.
Once the dhcp server leases an address, it seems like the radio stack hangs, and the device ceases communication. Here's an older thread on the exact issue over at androidfouroms: http://androidforums.com/samsung-captivate/130403-wifi-terrible.html
I have tested multiple new unmodified captivates and the issue is identical accross the board.
Now that I am at work, and have coffee in me and not beer, I will go through the problem I had with miCap and works wireless. Due to my skeptical ways, I will be semi vague for security purposes. On with it.
When I originally got miCap (pet name for it) I was able to access our public wifi. It allowed me into the public portal to agree to terms. I played a little bit on it, but wanted to see if I could access our private wifi. I got in the private no problem. But after that I never was able to get back on to our public. It did the same thing as I've read. It got an ip no problem (via dhcp) and acted like all was well. No browser, or ap could get a connection. The phone would not switch over to 3g to get info.
Armed with ip and mac address, my co-worker and I started to did through our monowall. ( He also has a cap that had no issues on public or private). We try tried reserving the ip for miCap, didn't work. We tried static ip, didn't work. I spent the morning completely wiping miCap to get it back to return worthy.
This was when I decided on last ditch effort.
Our ap's are cisco's that connect into monowall. I got into monowall and dug around. I found that with in the captive portal (how fitting) that the ip/mac associated with my phone hadn't checked in for 8 days. Even though I tried everyday. I deleted the entry to the phone there and suddenly my phone was getting access again.
Now I understand that this may not help everyone, because setups vary from place to place. But digging deeper into configurations at the access points may be what is needed. Do I think the phone had nothing to do with it? No, I think it helped aggravate the problem.
We have had problems with the Intel 3945abg chipsets with the same exact setup. That problem was fixed with driver updates on the laptops.
sorry for the long winded reply.
So in a nut shell you deleted the DNS entry for that ip/mac in the firewall and you are working.
Pmac25 said:
So in a nut shell you deleted the DNS entry for that ip/mac in the firewall and you are working.
Click to expand...
Click to collapse
Essentially yes. But it is not listed like that in the portal. Hmmm. I wonder about the combo of dhcp/dns being the culprit.
I was able to resolve this issue by changing my connection settings from DHCP to static for the Cisco APs.
Installing WiFi Buddy from the market allowed me to access these connection settings.
I just used an address from our static IP pool.
Manually set IP, subnet, gateway, and DNS, and now im finally rolling on our enterprise wifi network
I sent a help ticket into samsung; maybe if enough folks do we can get it on their radar.
jhannaman82 said:
I was able to resolve this issue by changing my connection settings from DHCP to static for the Cisco APs.
Installing WiFi Buddy from the market allowed me to access these connection settings.
I just used an address from our static IP pool.
Manually set IP, subnet, gateway, and DNS, and now im finally rolling on our enterprise wifi network
Click to expand...
Click to collapse
you can set the ip manually with out an app. When on the wifi screen, hit menu-advanced. This is a good time to set the wi-fi sleep policy also.
phlunkie said:
you can set the ip manually with out an app. When on the wifi screen, hit menu-advanced. This is a good time to set the wi-fi sleep policy also.
Click to expand...
Click to collapse
Thanks for that, i figured the menu was built in somewhere just never found it.
:thumbsup:
UPDATE
So I flashed the i9000 Eclair rom last night, and when I got into work today I can connect and use the wifi here. So looks like something AT&T buggered up, big surprise there, when they "customized" the captivate.
As much as I normally love blaming AT&T for problems, that can't be done here. My Captivate (running Stock Firmware) connects just fine to my work network. We use 802.1x with PEAP/MSCHAPv2 for authentication.
Anyone been able to connect at over 802.11b speeds while connected to an 802.1x network? I show connections at G and N speeds on my WPA2 network but nothing over 11Mbps on 802.1x.
Sent from my SAMSUNG-SGH-I897 using XDA App
Hi,
I am also having problems with my work wifi network.
It is 802.1x, on TTLS/PAP it also requires a thawte premium server ca certificate insalled.
Is there any way to connect this kind of networks?
With my previous iphone 3g it was taking only 4-5 seconds.
Has anyone tried faceniff on the atrix yet?
yeah it works. lol.
Such a vague post. Whats it all about? Details maaan!
theres always google
I meant on the Atrix which is the forum I am posting in
It works well on the Atrix. I have it and it does seem to work.
Scott
Does anyone know it works on WPA and WPA2? Are they forcing the client re-associate to the AP to sniff the initial key negotiation?
Works on WPA2 here. Does not work on EAP though I don't think.
Why would you want to steal peoples accounts (identities)?
Sent from my MB860 using XDA App
drew68 said:
Why would you want to steal peoples accounts (identities)?
Sent from my MB860 using XDA App
Click to expand...
Click to collapse
To troll in public hotspots
Hmmm does anyone here has an unlocked version? 0.o
Works great for me *edit: on the Atrix*. I asked the dev about putting the unlocked on Market or Amazon (dont like paypal). He said it was removed from the Market and he will look into Amazon.
If he releases some code(maybe he already has, haven't looked), this could open likes of similar apps. I especially like the idea of an Atrix as a wireless monitoring device since it has 5ghz, unlike almost all other phones.
I bought it and got it unlocked. This is more for curiosity's sake than actually hacking. I live out in the country. Not much for open wifi out here.
Scott
I went to a Starbucks today after getting the app, and I couldn't get it to work there.
Not sure if it has to do with the AT&T Wifi at starbucks, but I'm going to do more testing with it.
Did you try stealth mode, I guess some routers are built to monitor that kind of intrusion and stealth mode is the work around
Sent from my MB860 using XDA App
jenarelJAM said:
Faceniff has nothing to do with open vs WEP vs WPA vs WPA2 encryption on the network afaik(I haven't used it, but I read about it). It wont break encryption. My guess is that its doing a simple ARP poisoning attack, routing all network traffic through your phone before it goes out the router, then just filtering for unencrypted facebook/tsitter/etc. packets.
This has been around for years. What's new is that its been ported to a mobile phone and been made accessible to the masses.
Be careful using this guys, your network traffic leaves a trace, and I'm not sure if facesniff spoofs your mac address. You could get in big trouble if you get caught.
Sent from my MB860
Click to expand...
Click to collapse
I understand that you already have to be connected to the AP to do this but... as I understand it with WPA and WPA2 they negotiate session keys so that each connection uses a different key. Hence you cant decrypt another persons traffic. The key is negotiated in the beginning and if you can capture that negotiation, then you can decrypt the traffic.
Does faceniff only monitor new connections and then see if they log into one of those sites? or does it actively try and disassociate people from the AP so they have to reconnect.
Was using it on my home wifi. Was able to hack into mine and my gfs facebook accounts. Then i monitored my neighbors open wifi (tard) and was able to get into his. Told him to put a password on his wifi because of security. I think this is a real eye opener into the world of internet security. Really interesting app. Pretty scary. But yea, using this at school is a bad idea. I was just doing some packet sniffing at college and i got a nasty email saying that if i was doing anything nefarious i could be expelled. So remember: USE STEALTH =)
Hey there,
could someone send me a PM where to get this app.
THX!
jenarelJAM said:
Faceniff has nothing to do with open vs WEP vs WPA vs WPA2 encryption on the network afaik(I haven't used it, but I read about it). It wont break encryption. My guess is that its doing a simple ARP poisoning attack, routing all network traffic through your phone before it goes out the router, then just filtering for unencrypted facebook/tsitter/etc. packets.
This has been around for years. What's new is that its been ported to a mobile phone and been made accessible to the masses.
Be careful using this guys, your network traffic leaves a trace, and I'm not sure if facesniff spoofs your mac address. You could get in big trouble if you get caught.
Sent from my MB860
Click to expand...
Click to collapse
No poisoning needed. Wifi works the same as a hub. If you're associated to the network, you'll see all the traffic. Now there are ways to try to stop this, ap isolation, and whatnot, but it's radio, so there's really no way around it.
CLICK THE "USE SSL CONECTIONS ONLY" PEOPLE!
FYI: I'm writing a paper for a class of mine that concerns wlans. Something that I would like to include is how often peopel change their wlan passwords. I did a search on the internet for a similar poll but I did not find anything of merit. So, I'm hoping I might get some decent data, enough to mention in my paper.
Very rarely.
bump
I never change wlan passwords as i have enabled mac filtering, due to that no one could get access through my router.
same here, have wpa2 + aes with a hidden SSID and enabled mac filtering, so no reason really for me to change it
I never change my wifi password as I'm not the one in charge of that but the one who is I know never changes it as he does not know how to change the password used to auto connect the the router and I'm way too lazy to tell him how
Just FYI MAC filtering isn't the most secure. But using a good WPA/WPA2 password is. I probably should change mine but I don't want to. lol
MrObvious said:
Just FYI MAC filtering isn't the most secure. But using a good WPA/WPA2 password is. I probably should change mine but I don't want to. lol
Click to expand...
Click to collapse
I have router with WPA2 + AES + MAC Filtering enabled and i dont think anybody could crack all this.
jitkr said:
I have router with WPA2 + AES + MAC Filtering enabled and i dont think anybody could crack all this.
Click to expand...
Click to collapse
Technically all encryption can be broken. Right now AES encryption is very hard to break but if you have a weak password it is easy.
I have changed my pw once that's it.
Sent from my LiquidSmooth S3 using xda app-developers app
Every time when I buy a new router!
When:
I update my Router software or change the router.
I told it too many people.
But with the current setup I have something that will propably stay a while.
Wpa2 Aes only. SSID is broadcast, Mac Filtering is off, Key is 46 characters full-typable-charset randomness. Only for my devices.
I have a second network for guests which is open. I have put a button on the router that lets me toggle internet access for the guestnet so that people dont torrent the f*ck outta my bandwidth when I'm away or I'm alone.
If I ever get ultra bored enough I will propably try a overblown EAP-TLS setup just for the lulz, who knows maybe it will be profitable setting such up for other people somewhere in the future.
i never change mine, i guess i should start
I cannt change because I lost my modem login pass
Orginal PWD, never change it
Never. I set a new password when buying a new wireless router, but don't change it once it's set. I live in a very rural area so not much risk of someone trying to hack my network anyway.
twice a month for me
Sent from my Burst S280 using xda premium
never
Hi, not sure if this is the right section. If not, please move.
Basically each time I activate my phone's (Samsung S3 4.3 rooted) tethered Wi-Fi, to use the Internet on my iPad, someone can remotely connect and see what I'm doing. Even with WPA2 + strong ass password + MAC filtering. Why I know this is a long story, let's just say I have a stalker and he talks about his exploits to someone who's loyal to me. I'm assuming that it's possible since I've already have had my home Wi-Fi hacked with the WPS exploit.
Is there anything I can do? As in alternatives to stock app of anything else.
raskol9987 said:
Hi, not sure if this is the right section. If not, please move.
Basically each time I activate my phone's (Samsung S3 4.3 rooted) tethered Wi-Fi, to use the Internet on my iPad, someone can remotely connect and see what I'm doing. Even with WPA2 + strong ass password + MAC filtering. Why I know this is a long story, let's just say I have a stalker and he talks about his exploits to someone who's loyal to me. I'm assuming that it's possible since I've already have had my home Wi-Fi hacked with the WPS exploit.
Is there anything I can do? As in alternatives to stock app of anything else.
Click to expand...
Click to collapse
Try https://play.google.com/store/apps/details?id=com.foxfi&hl=en
It is really easy for him to spoof the mac address of your ipad and bypass the mac filtering.
He can also collect your wpa2 handshake and crack it easily with enough time and enough Cuda cores on his gpu.
First, Try a random max character wpa2 password and keep changing it to make him irritated.
Second, go on the offensive with kali linux.
(Put dd-wrt on your router too and disable wps to stop his wpa attack + use strong wpa2 key-no words or phrases)
Third, figure his credentials out and report him to the police.
You could use Kismet to find out his device's mac address and you could use his signal strength to find out what house he lives in then report him to the police.
Lgrootnoob said:
It is really easy for him to spoof the mac address of your ipad and bypass the mac filtering.
He can also collect your wpa2 handshake and crack it easily with enough time and enough Cuda cores on his gpu.
First, Try a random max character wpa2 password and keep changing it to make him irritated.
Second, go on the offensive with kali linux.
(Put dd-wrt on your router too and disable wps to stop his wpa attack + use strong wpa2 key-no words or phrases)
Third, figure his credentials out and report him to the police.
You could use Kismet to find out his device's mac address and you could use his signal strength to find out what house he lives in then report him to the police.
Click to expand...
Click to collapse
Thanks. I'l check this out.
I already secured my home Wi-Fi with DD-WRT, so the big deal is with the tethered connection. For now I've stopped tethering altogether.