YisusXD
Follower Engagement Pro
LEVEL 1
300 XP
So basically my idea is to make WPA cracking service for nulled users. As some of you might know, there are no decent WPA cracking services that are actually free. You have to pay electricity bills, dictionary fees so on and so forth.
How will it work?
To make this work, we need people who are willing to participate in this project. All of us will use our rigs to participate in the cracking process. We can create a program, which will allow us to control GPU utilization/usage, temps and most importantly number of keys tested.
How/Where to upload handshakes?
There's a built in software called besside-ng in both Backtrack and Kali distros. When you use besside-ng, handshakes from all access points in the range are automatically captured. Fortunately, besside-ng has an option to upload all captured handshake (for instance. besside-ng mon0 -s nulled.to)
What's In it for me???
Probably everyone will ask the same question. If we are to implement this idea, it would be essential to create some ground rules. To keep people encouraged to use their rigs as cracking devices, we need to implement the system. I believe, that all of you remember one of the important aspects of program (huge boobies? no dude wtf, it's number of keys tested), we have to save information of all users about number of keys they've tested to crack other members handshake. By using that information we can create some sort of multiplier. That multiplier will help us to limit user to specific number of attempts to crack his/her own handshake, when needed.
for instance, if you used app for a long time and now you want to crack handshake of your choice, and you have 1kkk keys tested in total on other ppl's handshakes, now you can upload ur handshake and wait until others try to crack yours with the limitation of 2kkk key attempts. (Hope you understand what I'm saying)
What about dictionaries?
Having good dictionaries is crucial part when it comes to cracking wpa. But I have no idea how to use dictionaries efficiently on different computers when they are trying to crack 1 handshake. To got to implement some measure to avoid using same words while cracking from different machines. I'm open to any suggestions about this issue and you can contribute too
How will it work?
To make this work, we need people who are willing to participate in this project. All of us will use our rigs to participate in the cracking process. We can create a program, which will allow us to control GPU utilization/usage, temps and most importantly number of keys tested.
How/Where to upload handshakes?
There's a built in software called besside-ng in both Backtrack and Kali distros. When you use besside-ng, handshakes from all access points in the range are automatically captured. Fortunately, besside-ng has an option to upload all captured handshake (for instance. besside-ng mon0 -s nulled.to)
What's In it for me???
Probably everyone will ask the same question. If we are to implement this idea, it would be essential to create some ground rules. To keep people encouraged to use their rigs as cracking devices, we need to implement the system. I believe, that all of you remember one of the important aspects of program (huge boobies? no dude wtf, it's number of keys tested), we have to save information of all users about number of keys they've tested to crack other members handshake. By using that information we can create some sort of multiplier. That multiplier will help us to limit user to specific number of attempts to crack his/her own handshake, when needed.
for instance, if you used app for a long time and now you want to crack handshake of your choice, and you have 1kkk keys tested in total on other ppl's handshakes, now you can upload ur handshake and wait until others try to crack yours with the limitation of 2kkk key attempts. (Hope you understand what I'm saying)
What about dictionaries?
Having good dictionaries is crucial part when it comes to cracking wpa. But I have no idea how to use dictionaries efficiently on different computers when they are trying to crack 1 handshake. To got to implement some measure to avoid using same words while cracking from different machines. I'm open to any suggestions about this issue and you can contribute too