• IP addresses are NOT logged in this forum so there's no point asking. Please note that this forum is full of homophobes, racists, lunatics, schizophrenics & absolute nut jobs with a smattering of geniuses, Chinese chauvinists, Moderate Muslims and last but not least a couple of "know-it-alls" constantly sprouting their dubious wisdom. If you believe that content generated by unsavory characters might cause you offense PLEASE LEAVE NOW! Sammyboy Admin and Staff are not responsible for your hurt feelings should you choose to read any of the content here.

    The OTHER forum is HERE so please stop asking.

buy LAPTOP? Think 10 times over!

matamafia

Alfrescian
Loyal
Business managers and SME owners better think 10 times before spending on laptops. Not worth the while regardless how cheap they may seem to be. Desktops pays back the investments better then laptops. Servers had been the most worthy in the past. But these days desktop are so powerful that they can serve as servers already. e.g. Quad-core CPU 8GB-16GB RAM, HDD over 1TB, that is more powerful than many old servers we previously used.

Often laptop end up as total lost. The data lost and security problems caused by laptop can cost damages over 1000X the cost of those laptops themselves. Also associated with laptops the security risk with wifi, is a HUGE HUGE HOLE. WEP & WPA are unsafe, can be hacked into by any one within 30 mins or less. The hacks works 100%.


http://au.news.yahoo.com/a/-/technology/5522106/lost-laptops-cost-companies-dearly-study/

Lost laptops cost companies dearly: study
April 25, 2009, 9:15 am


SAN FRANCISCO (AFP) - Today's mobile workforce is putting precious business secrets at risk, with lost or stolen laptop computers costing companies dearly, according to the Ponemon Institute.

A Ponemon study backed by chip giant Intel found that losing a laptop costs a firm on average 49,246 dollars after accounting for data loss, intellectual property, replacement, lost work time and legal expenses.

"An increasingly mobile workforce is putting corporations' sensitive and confidential information at great risk," researchers said in the study, which was released this week.

"It is the Information Age and employees are carrying more information on their laptops than ever before."

So-called "power-users" of corporate data are losing laptop computers in taxis, rental cars, hotels, airports, pubs, and conference centers, according to the research.

Ponemon's findings indicate that while senior executives are higher on the corporate ladder, the cost to companies of their lost laptops is typically less than half that of mobile computers lost by managers or directors.

The average cost of a lost laptop for a senior executive was pegged at just shy of 28,500 dollars while misplaced machines of managers or directors cost firms on average about 61,000 dollars, Ponemon determined.

Finding out quickly about missing laptops enables companies to "significantly" mitigate the cost of the loss, according to the study.

When companies learned a laptop was gone on the day it disappeared, the average loss was 8,950 dollars.

Not learning of the loss for a week raised the cost more than tenfold to nearly 116,000 dollars.

Lost laptops that had copies of files stored in backup systems proved to cost firms on average approximately 70,000 dollars while missing machines without backup cost companies 39,250 dollars.

"One plausible reason for this is that the backup makes it easier to confirm the loss of sensitive or confidential data," Ponemon researchers wrote. "In other words, it could be the ignorance-is-bliss hypothesis."

The cost of losing a laptop was typically reduced by 20,000 dollars if data stored in it was encrypted.

The Institute bills its Cost of a Lost Laptop study as a first in estimating the full cost of lost or stolen laptop computers.

Ponemon researchers analyzed 138 cases in which organizations in the United States experienced laptop loss or theft in the past 12 months.
 

matamafia

Alfrescian
Loyal
http://www.youtube.com/watch?v=Z4rAA21NPCI

http://www.metacafe.com/watch/1106987/how_to_crack_wep_wireless_networks_for_noobs/

WPA is SAFE? Kiss MY ASS! watch this:
http://www.youtube.com/watch?v=pejgAqgnTAk/
Note: this demo use Linux to crack, but you can use anything Mac Windows Linux to crack WPA.

http://it.toolbox.com/blogs/unwired/cracking-wpapsk-6730
Cracking WPA-PSK
bwilds (Software Engineer) posted 11/30/2005 | Comments (174)
As I mentioned in a previous blog, my team is working on a project where we perform a Man-in-the-Middle (MitM) attack on a WEP encrypted wireless network. The point of the project is to demonstrate how quick and easy it is to hack a WEP encrypted wireless network and to discuss and encourage additional methods of wireless security.

As I searched for useful hack tools I became especially excited about Aircrack. Aircrack is a package of great wireless auditing tools. It includes:


* Airodump: 802.11 packet capture program
* Aireplay: 802.11 packet injection program
* Aircrack: static WEP and WPA-PSK key cracker
* Airdecap: decrypts WEP/WPA capture files


The amount of time it takes to hack an encrypted wireless network is dependent on the amount of traffic. Less traffic means the hack will take more time and vise versa. That's why the Aireplay tool is so exciting. It is basically a traffic generator, which enables the hacker to up the networks traffic level, thus speeding up the hack.

The other tools that caught my interest are Aircrack and Airdecap because they work for both WEP and WPA encryption, which in my experience thus far hacking tools are typically limited to WEP.

All IT/Tech geeks know that WEP can be cracked with relative ease, but what is not as well know is how quick/easy it is to crack WPA-PSK encrypted network. Since the tool exists we've decided to expand our scope to cracking a WPA-PSK encrypted network rather then a WEP encrypted network.

Now all of my comments on Aircrack thus far are only based on research. Hopefully we will be able to play with these tools tonight and find out how well they work. I will be sure to give a review of the package once we've finished our work.

If anyone has experience with this package I welcome your comments/lessons learned.


http://docs.lucidinteractive.ca/index.php/Cracking_WEP_and_WPA_Wireless_Networks
48699.png


http://blogs.zdnet.com/Ou/index.php?p=41

Hack most wireless LANs in minutes!

Posted by George Ou @ 3:19 am

Categories: Security

Tags:
37 TalkBacks


Even after two years of WPA certification and nearly one year after 802.11i ratification, you might be wondering why I’m still talking about WEP encryption. The fact is, I would love to stop talking about it if there weren’t such an overwhelming percentage of corporations, retail outlets, and hospitals still using WEP. Although WPA brought us TKIP (think of TKIP as WEP 2.0) encryption and 802.11i brought us AES encryption, the upgrade process has been extremely painful and many products still don’t support TKIP let alone AES. The sad state of wireless LAN security is that the majority of corporations and hospitals still use dynamic per-user, per-session WEP keys while the majority of retail outlets that I’ve seen still use a single, fixed WEP key.

In the past, a hacker was at the mercy of waiting long periods of time for legitimate traffic on a wireless LAN to collect 10 million of packets to break a WEP key. In my previous blog on this topic, which was based on Mike Ossmann’s WEP article, I alerted you to the startling fact that even wireless LANs that used 802.1x/EAP authentication to dynamically assign unique per-user, per-session WEP keys were no longer safe against WEP hacking since WEP cryptanalysis had improved 50 fold. Instead of waiting for hours or even days for those 10 million packets, you now only needed about 200,000 packets to break WEP. Even though dynamic WEP key rotation could change a user’s WEP key every few minutes or so (note that key rotation isn’t always implemented by default), the new WEP cryptanalysis techniques put even dynamic WEP in striking range. Now with the new active attacks on WEP described in Ossmann’s follow-up article, hackers no longer need to passively wait for legitimate packets on a wireless LAN because they can actively inject packets into a wireless LAN to ensure a speedy packet collection session. The end result is, any WEP based network with or without Dynamic WEP keys can now be cracked in minutes! If you’re scared, you should be and you’d better go back and read the recommendations in the end of my previous blog if you’re still running WEP in any form.
 
Last edited:

matamafia

Alfrescian
Loyal
You can hack any mata; government; SAF; business & home wifi.

REAL EASILY.

If the hack does not work, they will give you a FREE ROUTER!



http://www.engadget.com/2008/11/06/wpa-cracked-in-15-minutes-or-less-or-your-next-routers-free/

WPA cracked in 15 minutes or less, or your next router's free


router.jpg


by Tim Stevens, posted Nov 6th 2008 at 10:58AM
WPA cracked in 15 minutes or less, or your next router's free
They always knew it could be done; that a hacker with enough time and processing power could watch your WPA-protected wireless network and, eventually, decrypt your precious datas. In under 15 minutes, though? "Inconceivable!" those hypothetical security experts would say -- but they're about to get a lesson from WiFi wizard Erik Tews. He'll be giving a presentation next week at the PacSec Conference in Tokyo, describing the "mathematical breakthrough" that, he says, enables him to crack WPA-TKIP in 12 to 15 minutes. There are some limitations, as the data sent from a connected device to the compromised router is apparently still safe, but anything headed t'other way is wide open, and could even be supplanted by bogus bits sent from a Cheetos-munching hacker slouching in a rusty Ford Taurus in the parking lot. Don't believe us? Tews was the guy able to crack WEP in under a minute last year, ironically advising people to switch to WPA ASAP at the time. We can only assume WPA2 is next.
 
Top