Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
992Proxy

Locked Gerix WiFi Cracker-NG


sQuo

Recommended Posts

This is the hidden content, please

 

Description

 

Gerix Wifi Cracker NG (New Generation), a really complete GUI for Aircrack-NG which includes useful extras. Completely re-written in Python + QT, automates all the different techniques to attack Access Points and Wireless Routers. Currently it is available and supported natively by BackTrack (pre-installed on the BT4 Final version) and available on all the different Debian Based distributions (Ubuntu, ecc..).

 

The software requires: aircrack-ng, xterm, machchanger, zenity and obviously python-qt3. The version 1.0 is publicly released for the last tests and to collect opinions from users. Obviously the sources are public, "ergo" anyone can make packages for other distributions and send everything to us, to be available here, in the Download space. :-)

 

 

 

This is the hidden content, please

Pass: level-23.biz

 

Sample Usage

 

root@bt:~# genkeys

genkeys 2.0 - generates lookup file for asleap.

genkeys: Must supply -r -f and -n

Usage: genkeys [options]

 

-r Input dictionary file, one word per line

-f Output pass+hash filename

-n Output index filename

-h Last 2 hash bytes to filter with (optional)

 

root@bt:~# asleap

asleap 2.0 - actively recover LEAP/PPTP passwords.

asleap: Must supply an interface with -i, or a stored file with -r

Usage: asleap [options]

 

-r Read from a libpcap file

-i Interface to capture on

-f Dictionary file with NT hashes

-n Index file for NT hashes

-s Skip the check to make sure authentication was successful

-h Output this help information and exit

-v Print verbose information (more -v for more verbosity)

-V Print program version and exit

-W ASCII dictionary file (special purpose)

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.