If you need assistance, please send an email to forum at 4hv dot org. To ensure your email is not marked as spam, please include the phrase "4hv help" in the subject line. You can also find assistance via IRC, at irc.shadowworld.net, room #hvcomm.
Support 4hv.org!
Donate:
4hv.org is hosted on a dedicated server. Unfortunately, this server costs and we rely on the help of site members to keep 4hv.org running. Please consider donating. We will place your name on the thanks list and you'll be helping to keep 4hv.org alive and free for everyone. Members whose names appear in red bold have donated recently. Green bold denotes those who have recently donated to keep the server carbon neutral.
Special Thanks To:
Aaron Holmes
Aaron Wheeler
Adam Horden
Alan Scrimgeour
Andre
Andrew Haynes
Anonymous000
asabase
Austin Weil
barney
Barry
Bert Hickman
Bill Kukowski
Blitzorn
Brandon Paradelas
Bruce Bowling
BubeeMike
Byong Park
Cesiumsponge
Chris F.
Chris Hooper
Corey Worthington
Derek Woodroffe
Dalus
Dan Strother
Daniel Davis
Daniel Uhrenholt
datasheetarchive
Dave Billington
Dave Marshall
David F.
Dennis Rogers
drelectrix
Dr. John Gudenas
Dr. Spark
E.TexasTesla
eastvoltresearch
Eirik Taylor
Erik Dyakov
Erlend^SE
Finn Hammer
Firebug24k
GalliumMan
Gary Peterson
George Slade
GhostNull
Gordon Mcknight
Graham Armitage
Grant
GreySoul
Henry H
IamSmooth
In memory of Leo Powning
Jacob Cash
James Howells
James Pawson
Jeff Greenfield
Jeff Thomas
Jesse Frost
Jim Mitchell
jlr134
Joe Mastroianni
John Forcina
John Oberg
John Willcutt
Jon Newcomb
klugesmith
Leslie Wright
Lutz Hoffman
Mads Barnkob
Martin King
Mats Karlsson
Matt Gibson
Matthew Guidry
mbd
Michael D'Angelo
Mikkel
mileswaldron
mister_rf
Neil Foster
Nick de Smith
Nick Soroka
nicklenorp
Nik
Norman Stanley
Patrick Coleman
Paul Brodie
Paul Jordan
Paul Montgomery
Ped
Peter Krogen
Peter Terren
PhilGood
Richard Feldman
Robert Bush
Royce Bailey
Scott Fusare
Scott Newman
smiffy
Stella
Steven Busic
Steve Conner
Steve Jones
Steve Ward
Sulaiman
Thomas Coyle
Thomas A. Wallace
Thomas W
Timo
Torch
Ulf Jonsson
vasil
Vaxian
vladi mazzilli
wastehl
Weston
William Kim
William N.
William Stehl
Wesley Venis
The aforementioned have contributed financially to the continuing triumph of 4hv.org. They are deserving of my most heartfelt thanks.
Registered Member #56
Joined: Thu Feb 09 2006, 05:02AM
Location: Southern Califorina, USA
Posts: 2445
I realise this has a blackhat smell to it, but bear with me...
At my school we have laptop carts with an access point and a printer on them. Of course the access points are encrypted with 128bit wep, preshared key. All is good... Until some assaht decided to go around and type random crap into where the wep key goes in windows So now half the the computers on the cart don't connect to the network, which makes then completely useless as they have no floppy drive, the no burners, and aren't sp2 so you can't plug in a thumbdrive (and of course we aren't admin so we can't install the drivers)
But there is hope, there are some that survived (they had a dead battery at the time of the attack, so they were safe) that still have the key in them... But of course it is starred out so we can't just copy it over.
The teacher put in a request for the it department to come and fix it, but it has been 3 days now and it really sucks to have so share like 4 people to a computer.
So I need to get the keys out. If I were an admin I would just run wzcook and things would be done, but we have limited accounts so it won't run
I suppose it would be possible get they key by sniffing the network and then generate a bunch of activity using a good laptop, but that would require me lugging in my laptop and is kind of crossing the fine line between helping and hacking. The teachers might freak if they see me with a terminal open
Is there any way to get the (encrypted I assume) keys stored on the computer and them decode them at home? Or a tool that gets them with just a limited account?
wrote ... Before SP2 - under
HKLM\\SOFTWARE\\Microsoft\\WZCSVC\\Parameters\\Interfac es\\
--PA
"Philip Herlihy" <**link**> wrote in message news:**link**...
> When I configure a WEP key into my wireless gadget using the vendor's
> interface program, does the key I supply end up in Windows somewhere or in
> the flash memory on the device itself?
>
> --
> ####################
> ## PH, London
> ####################
>
>
Registered Member #56
Joined: Thu Feb 09 2006, 05:02AM
Location: Southern Califorina, USA
Posts: 2445
I saw the forum you posted, but it referes to a registry location... Which as I said I can't acess.
As to using chopchop... As far as I can tell it is only available for *nix systems, and I doubt it will support the integrated wifi card, So I would have to bring in my laptop. Which puts me back at square one just trying to blindly hack into the schol
Registered Member #30
Joined: Fri Feb 03 2006, 10:52AM
Location: Glasgow, Scotland
Posts: 6706
I don't get it. If some kid without admin privileges could go round typing in the wrong keys, can't you just go round again and type in the correct ones? Or is the problem that nobody outside the IT department knows what the right keys should be?
Maybe you could log into the access point's web admin interface and just read the keys off it. On mine, I just type http://192.168.0.1 in a web browser, and enter a user name and password. If you're lucky, the user name will be "admin" and the password will be "password" The IP address for admin, and the default username and password, are usually printed on a sticker somewhere on the AP. If you're lucky, the IT guy might have written the keys there too.
If that doesn't work, I don't see any other way to do it than bringing your own laptop in and sniffing the keys. Or waiting for the IT department (and while you're waiting, complain to the teacher about the lack of laptops and get all your classmates to complain too)
Vigilatny Registered Member #17
Joined: Thu Feb 02 2006, 02:47PM
Location: NL
Posts: 158
... wrote ...
I saw the forum you posted, but it referes to a registry location... Which as I said I can't acess.
I don't see where you said that. By default normal users have read permissions on the registry(kinda necessary). Obviously these computers are configured so whatever type of user you are has permission to change the wep key....
Registered Member #79
Joined: Thu Feb 09 2006, 11:35AM
Location: Arkansas
Posts: 673
I don't know if this will work in your situation, but...
Run the wireless setup wizard on one of the good computers. Select add new computers to the existing network, and it should give you an option to use USB or print out the 32 digit key? Works on my computer...
If you can't get to control panel, open help, and it should open from there. I don't know way but that works on all the computers I've tried. You should also be able to get into the system information util and regedit IIRC.
Registered Member #119
Joined: Fri Feb 10 2006, 06:26AM
Location: USA
Posts: 114
What program is being used to store the keys on the computers? Many of them show the keys with astrixs which might be easily revealed with a program that can reveal password boxes. I would definitly try the registry option if that fails. If you can't get the key from logging into the access point etc, try breaking it. My friend says he can break a 128 bit key in 10min by flodding deauth packets, but have no idea if this is true as I thought the only use of that was DOS, which I am heavily against.
Registered Member #56
Joined: Thu Feb 09 2006, 05:02AM
Location: Southern Califorina, USA
Posts: 2445
It would be quite easy to crack it using the security hole in wep since I have access to a client that is connected to it, so be dragging some files on/off of the network I should be able to produce tons of interesting packets. But that involves me bringing my laptop...
Currently the keys are in the windows wireless network manager, although it wouldn't surprise me if they are in the dell software too. I am waiting on the admin password (cracking as I type) so hopefully tuesday I can get admin access to the computer and run wzcook. Unless you happen to know of any password revelers that run on limited accounts...
My best guess as to what you friend is doing is called 'packet injection' where you capture a packet from one of the clients, and constantly send it back at the router, and when it responds you get packets.
This site is powered by e107, which is released under the GNU GPL License. All work on this site, except where otherwise noted, is licensed under a Creative Commons Attribution-ShareAlike 2.5 License. By submitting any information to this site, you agree that anything submitted will be so licensed. Please read our Disclaimer and Policies page for information on your rights and responsibilities regarding this site.