Mr. Penguin submitted a new resource: BigPwnd (version 1.0) - Crack WPA / WPA2 BigPond Telstra Networks in Australia Read more about this resource... Aby$m and VIP
It cracks only BigShitPond THOMSON routers and it can't crack BigShitPond Technicolor routers!!! using MAC of BigShitPond with Technicolor router in #4 of the main menu it shows the DPass of the AP but wrong Pass!!! most of DPass starts with 8847 and the last 4 digit of the MAC but still it doesn't work only on Technicolor routers. Hope someone finds a way to crack BigShitPond with Technicolor routers same method as Thomson's Have A look at this web Mr P every interesting stuffs http://routerpwn.com/
Thanks A LOT Mr. Penguin :crazytroll: that's what i was looking for in the past 2 month. keep up the good work
Can't believe you can crack a Thomson when the SSID network name has changed. This is big news Thank you Fantastic for reporting.
I cracked all Thomson in my area 7 APs in leas than 4 min I admit it's the best tool for lazy and impatient person
Today i install xubuntu on my hd partition, this night i work on ufo wardriving 4. These networks are supported in UW 4, but i try to improve the software! Wifi free for all . I think to create a new dictionary to crack wpa key that contains all possible passwords on all routers known UFO. a dictionary is ready for all networks thomson that have changed SSID and you can find it here If you have any suggestion contact me!
im new to bt5 and im kinda working it out as i go lol, but this is good iv gotten 1 bigpond key so far i just need a better wifi aerial for a better signal if anyone has a suggestion for me?
Hello, i suggest this: http://www.amazon.it/Tp-Link-TL-ANT...F8&qid=1373561826&sr=8-1&keywords=TL-ANT2424B with this amplifier: http://www.amazon.it/AMPLIFICATORE-...qid=1373561859&sr=1-1-catcorr&keywords=8000mw and this adapter for connect the grid with amplifier: http://www.ebay.it/itm/CAVO-PIGTAIL...2?pt=LH_DefaultDomain_101&hash=item415cd8b972 I have this configuration, it's the best!
sweet as thanks mate im thinking of upgrading in the next few weeks? id say that will help me pick up a lot more wifi's to play with
hey man, this is a very nice scrip,it works 100% for me but i just wanted to ask is it possible to make it work on netgear routers?
@Abdul1 Sorry but it is not my script. For dlink and netgear it is not possible because there is no default algorithm.
Thanks for that. Didn't know there was a version number but knew it was original so I appended 1.0 as the first version @samnewman01. Changing now.
I have an issue with Ubuntu 13.04 Installing works Code: Select All This script will copy and install the necessary scripts for BigPwnd It shouldn't take too long. Relax... bigpwnd directory already exists, skipping All good so far... This message has been approved by Capt_Noobius Everything has been installed properly... Type bigpwnd to run bigpwnd! Then I get Code: Select All root@ubuntu:/home/xiaopanpro/Desktop/BigPwnd# bigpwnd Traceback (most recent call last): File "/usr/bin/bigpwnd", line 25, in <module> from scapy.all import * ImportError: No module named scapy.all root@ubuntu:/home/xiaopanpro/Desktop/BigPwnd# python bigpwndSetup.py --- Double Post Merged, 29 Dec 2013 --- Nevermind, installing scapy helped
Seeking any updates or new information on version 1.0 Issues: No verbose output to indicate progress or even what its doing. Crack captured packets with dictionary - missing dictionary and its location in the system - not created during install refrence line below: Because this Charset.lst file is missing... not much else works. aircrack_tendigit_attack= '/pentest/passwords/crunch/./crunch 10 10 -f /pentest/passwords/crunch/charset.lst bruteforce_main= '/pentest/passwords/crunch/./crunch 10 10 -f /pentest/passwords/crunch/charset.lst
When I run the installer as root it returns Then when I run it and pick option [1] Crack saved WPA/2 handshakes it returns I'm running Ubuntu 14.0.0, does anyone know of a fix or another similar app? --- Double Post Merged, 10 Nov 2015, Original Post Date: 28 Oct 2015 --- Figured it out. You have to create "/pentest/wireless/BigPwnd" from your "/" directory. Add wps2key to "/pentest/wireless/BigPwnd/wps2key.py" And it will work. Are there any updated versions or similar apps to this?