
- #HOW TO CRACK WIFI PASSWORDS WITH RAINBOWTABLES WPS2 MOVIE#
- #HOW TO CRACK WIFI PASSWORDS WITH RAINBOWTABLES WPS2 MAC#
if you include unintentionally unique elements (a word you always misspell), or elements that aren't really unique (you always append the same character), then your passphrase is vulnerable to a dictionary-like attack by an attacker who has some knowledge of you, particularly one who you've told your scheme to. Once you have to remember what you spelled/capitalized/punctuated in a nonstandard way, what have you really gained?
#HOW TO CRACK WIFI PASSWORDS WITH RAINBOWTABLES WPS2 MOVIE#
if you include intentional and unique modifications, a quote from a public work like a movie or play is not particularly easier to remember than something from or similar. if you do not include "unique elements" (that is, you quote straight from wikiquote or similar), a quote is less secure than 4 random dictionary words due to being subject to wikiquote-driven dictionary-style attacks. My line of argument is more complex than you give it credit for. Well, I feel a little dumber and a little smarter.
#HOW TO CRACK WIFI PASSWORDS WITH RAINBOWTABLES WPS2 MAC#
If they were sending their MAC address to me, then my own client machine would be sending its MAC address in clear text to them, telling them which MAC address to pretend to have. Of course, if I'd been a little smarter, I would have noticed that my own linux process was using the MAC address a client claimed to have to throw out unrecognized machines (before I had MAC address filtering as a built-in router feature). If I'm understanding correctly, that's a powerful point.ģ) I knew that MAC addresses could be spoofed, but I was thinking they wouldn't know WHICH MAC address to pretend to have.


If I understand correctly:ġ) I would define something as "not cracked" if it is as strong as its password-in other words, there's no way to circumvent it that isn't a general vulnerability (peek through my window, get a keylogger on my machine, etc.) I assume you're telling me that this is the case with WPA2.Ģ) It sounds as though you are saying that something like WPA2 doesn't just authenticate a login but remains in use as an encryption key for subsequent wireless data interchange between client and base station. First: thanks to ALL of you who answered.
