Answer for 6ixtynin9

Discussion in 'Linux - General discussion' started by Marielmx3, Jun 23, 2009.

  1. Marielmx3

    Marielmx3 Member

    Joined:
    Dec 8, 2005
    Messages:
    46
    Likes Received:
    0
    Trophy Points:
    16
    First of all let me tell you pal youre certianly not very smart for making such a stupid comment. it kind of make me feel like not helping you at all, but ima give you the benefit of a doubt and as a pentesting user and student, I got to defend my cause from what surprisingly appears to be ignorance from some of our mods and even some of our senior members (or whatever d * addicts are)

    yes some very stupid kids around here only use live cd distros or even go to the trouble of creating dual boots linuxes in order to hack into wep/wpa psk2 networks, but some of us on the contrary utilize these distros to enhance our security and test our own (and our clients) networks privacy level. After all any kids with the right tools can hack into your network, inject a tracking worm to your router and steal all your private stuff thus making your life a living hell.
    so lets start and please let me stress that I have no responsibility of how you use the following knowledge i sure hope you dont try it for harmful purposes and because either way i really don't know your intentions i will just point you to the right direction i hope you at least have 2 or 3 brain cells to make it work
    so yeah aircrack is a wonderful tool but unfortunately not all wireless cards are compatible with it, I recommend you to google or whatever (REMEMBER SEARCH ENGINES ARE YOUR BEST FRIEND) if your wireless card is compatible with aircrack
    also
    so you mean you dont know how to check if you installed a file or not? good luck reading beginner linux tutorials after youre done reading you will also find out why your packet injection are failing
    thats all i can do for you my dear noob and i do it because all of us where noobs once learning by yourself is better. always
    REEXBTb4
     
    Last edited: Jun 24, 2009
  2. creaky

    creaky Moderator Staff Member

    Joined:
    Jan 14, 2005
    Messages:
    27,900
    Likes Received:
    1
    Trophy Points:
    96
    I take it you didn't notice that 6ixtynin9 is no longer a member here, and you decided to ignore my comment about foul language ?
     
    Last edited: Jun 24, 2009
  3. Marielmx3

    Marielmx3 Member

    Joined:
    Dec 8, 2005
    Messages:
    46
    Likes Received:
    0
    Trophy Points:
    16
    I apologize for my foul language, I made a couple of posts last night all mostly with the same language but starting today i haven't said one bad word ^ ^
     
  4. varnull

    varnull Guest

    yeah.. but hacking/cracking and accessing other peoples networks is not something we talk about here PERIOD!! guaranteed way to get this site taken down within days.. that's why there aren't any forums which do discuss these things. (ever wondered)

    The info is there for those who want to look hard enough for it.. but I'm not doing jail time for helping some kid hack a national security system of some kind then his isp shows the logs where he got the info (YES.. governments have access to every single post we make anywhere.. because our isp's log it all for them.. don't talk about using a proxy.. still have to use your isp's wire or somewhere else that can be traced if they want you bad enough)

    Strange ethics being a grey hat hacker.. I guess I should get one of the friendly mods to dish me out some IP's and have a little play on a neighbours pwned wpa/psk wifi thing or my admin account on our local government network.. that's if I can't be bothered dumping the connection database files straight off the afterdawn servers in Texas...

    ethics my friend.. just because we know how and can doesn't mean we should.. in fact there is a large legal responsibility that goes with certain kinds of knowledge.. as one day you will no doubt find out when the cops come through your parents door and arrest the lot of you under the national security laws.
     

Share This Page