It is possible to crack WPA/WPA2 wireless network credentials using any number of open source tools available now including oclHashcat+, aircrack-ng, or pyrit to name a few. If you are having trouble cracking a password it is possible that the network uses RADIUS authentication instead of pre-shared keys(PSK). Now you could see this when if you looked at the details of the network you were attempting to capture authentication packets for as it would display as WPA Enterprise versus WPA Personal. It definitely happens though that this is not considered during the capture so you may need to verify that a network is WPA/WPA2 Personal versus WPA/WPA2 Enterprise once you are attempting to crack the authentication. You can do this using Wireshark and the details below.
It is very common when obtaining wireless network handshakes to end up with a huge capture(.cap or .pcap typically) file. Previously purehate wrote this article on filtering out SSID specific EAPOL packets from a capture file but if you wanted to keep any and all packets related to a specific SSID including data packets, beacon frames, etc. the below tshark command will accomplish that. This is very similar to the previous article but will provide more data for the user and still slim down a capture file if you had packets from multiple SSID’s.
Recently I was digging in an old box of routers I have because I was looking for a wireless router to use as a secondary wireless network at my house. The secondary network needed to run WPA but be as secure as possible in every other way so my PSP could connect to it and use the Internet. I located a wrt55AG but the power would not come on and it took a moment but I finally remembered the story behind it. A friend had given me the wireless router saying the lights would not turn on after they used the incorrect plug to plug it in. I don’t know anything about hardware so I decided to give it a go with nothing to lose. Below are the steps taken to fix the router and get it operational again to be used as a secondary wireless router at my house.
If you are having trouble communicating between the wired and wireless networks after installing or upgrading your Linksys WRT600N wireless router with dd-wrt firmware then the issue is likely related to the VLAN configuration. After you flash the firmware on a Linksys WRT600N you will have the default dd-wrt settings. One of these settings includes separating the wired and wireless traffic because this is the correct way to secure things because the wireless network is much more likely to be breached than the wired network. Switching this setting to allow communication between wired and wireless devices is easy by following the directions below.
- Login To WRT600N: Visit the web administration GUI at your routers internal IP address using the HTTPS protocol. If HTTPS is not set up then you should first configure that before you proceed.
The Blackberry Curve 8320 has a built in WiFi card that can connect to T-Mobile HotSpot locations as well as any other wireless networks that you configure on the device. The authentication methods that are supported by this device as noted by T-Mobile’s support web site are listed below. Most home based wireless networks that have authentication configured use WEP, WPA, or WPA2 so you should not have any issues connecting with your Blackberry Curve 8320.