If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. |
|
|
Thread Tools | Display Modes |
#1
|
|||
|
|||
WPA handshake files
Hi,
This is crossposted. I've asked this question in the crypto newsgroups. I have a place in mind but I can't remember where. I have collected six WPA handshake files. Now that I am getting somewhere with high power directional WiFi, I figure I could collect up to ninety WPA handshake files. WPA handshake files are tedious to crack or, impossible to crack, in one big bang time. Or so they say. True randomness is next to impossible. I don't want to do the work of finding underlying patterns in a collection of WPA handshake files, but maybe some else will do the research. My question is, where to find an anonymous upload website where these files can be placed, stored and then downloaded anonymously? Or maybe a suggestion for an NNTP newsgroup and storage for maybe a year on a server somewhere? Anonymously Yours, X |
Ads |
#2
|
|||
|
|||
WPA handshake files
Norm X wrote:
Hi, This is crossposted. I've asked this question in the crypto newsgroups. I have a place in mind but I can't remember where. I have collected six WPA handshake files. Now that I am getting somewhere with high power directional WiFi, I figure I could collect up to ninety WPA handshake files. WPA handshake files are tedious to crack or, impossible to crack, in one big bang time. Or so they say. True randomness is next to impossible. I don't want to do the work of finding underlying patterns in a collection of WPA handshake files, but maybe some else will do the research. My question is, where to find an anonymous upload website where these files can be placed, stored and then downloaded anonymously? Or maybe a suggestion for an NNTP newsgroup and storage for maybe a year on a server somewhere? Anonymously Yours, X Do you really need to crack them, or is it more fun to dream about them ? http://www.smallnetbuilder.com/wirel...owall=&start=3 Paul |
#3
|
|||
|
|||
WPA handshake files
"Paul" wrote
Norm X wrote: Hi, This is crossposted. I've asked this question in the crypto newsgroups. I have a place in mind but I can't remember where. I have collected six WPA handshake files. Now that I am getting somewhere with high power directional WiFi, I figure I could collect up to ninety WPA handshake files. WPA handshake files are tedious to crack or, impossible to crack, in one big bang time. Or so they say. True randomness is next to impossible. I don't want to do the work of finding underlying patterns in a collection of WPA handshake files, but maybe some else will do the research. My question is, where to find an anonymous upload website where these files can be placed, stored and then downloaded anonymously? Or maybe a suggestion for an NNTP newsgroup and storage for maybe a year on a server somewhere? Anonymously Yours, X Do you really need to crack them, or is it more fun to dream about them ? http://www.smallnetbuilder.com/wirel...owall=&start=3 Paul WPA cracking takes prodigious CPU power. Dictionary attacks tend not to work. Amazon EC2 cloud computing has been around for a while. Now Google comes to the rescue: https://developers.google.com/cloud/terms/ I have a modest GPU but it is not supported by a popular Russian WPA cracker program. Cloud cracking is the way to go. I cannot understand why people devote GPGPUs to Bitcoin hash computing when cloud computing is more efficient? Eventually Bitcoin will be cracked and someone will be much richer, others poorer. Bitcoin is not supported by government hence no government law enforcement agency will not retaliate. Anonymous supports Bitcoin. Anonymous will retaliate. I laugh at Anonymous because I am anonymous. X |
#4
|
|||
|
|||
WPA handshake files
Norm X wrote:
"Paul" wrote Norm X wrote: Hi, This is crossposted. I've asked this question in the crypto newsgroups. I have a place in mind but I can't remember where. I have collected six WPA handshake files. Now that I am getting somewhere with high power directional WiFi, I figure I could collect up to ninety WPA handshake files. WPA handshake files are tedious to crack or, impossible to crack, in one big bang time. Or so they say. True randomness is next to impossible. I don't want to do the work of finding underlying patterns in a collection of WPA handshake files, but maybe some else will do the research. My question is, where to find an anonymous upload website where these files can be placed, stored and then downloaded anonymously? Or maybe a suggestion for an NNTP newsgroup and storage for maybe a year on a server somewhere? Anonymously Yours, X Do you really need to crack them, or is it more fun to dream about them ? http://www.smallnetbuilder.com/wirel...owall=&start=3 Paul WPA cracking takes prodigious CPU power. Dictionary attacks tend not to work. Amazon EC2 cloud computing has been around for a while. Now Google comes to the rescue: https://developers.google.com/cloud/terms/ I have a modest GPU but it is not supported by a popular Russian WPA cracker program. Cloud cracking is the way to go. I cannot understand why people devote GPGPUs to Bitcoin hash computing when cloud computing is more efficient? Eventually Bitcoin will be cracked and someone will be much richer, others poorer. Bitcoin is not supported by government hence no government law enforcement agency will not retaliate. Anonymous supports Bitcoin. Anonymous will retaliate. I laugh at Anonymous because I am anonymous. X Have you seen the latest hardware table for Bitcoin ? It's hilarious. This will show you, why a processor in the Amazon cloud, doesn't have a chance. Look at the ratio, between a "Hashblaster" and a CPU. https://en.bitcoin.it/wiki/Mining_Hardware_Comparison HashBlaster 3,300,000 megahash/sec $8799 purchase price 7970 video card 700 megahash/sec $ 500 E8400 processor 7 megahash/sec $ 180 The people who bought the video cards, are now "officially screwed" :-) Generations: CPU -- GPU -- FPGA -- Custom Silicon 7 700 3,300,000 We're now in the era of custom silicon. I don't know where the venture capital came from to spin custom silicon, but several companies have managed to do it. And they're spinning ridiculously small quantities of chips. You could do their entire production run, with a couple sample wafers from the fab. Really weird economics for silicon. Not normal at all. Normally, when you design custom silicon, your production run would involve larger numbers of chips. Actually, some of the people who have built bitcoin boxes with multiple video cards, work for a living at busting passwords (penetration testing). So the nice thing about the video cards, is they're re-programmable, and can handle slightly different problems with ease. Paul |
#5
|
|||
|
|||
WPA handshake files
On 01/30/2014 03:28 PM, Paul wrote:
We're now in the era of custom silicon. I don't know where the venture capital came from to spin custom silicon, but several companies have managed to do it. And they're spinning ridiculously small quantities of chips. You could do their entire production run, with a couple sample wafers from the fab. Really weird economics for silicon. Not normal at all. Normally, when you design custom silicon, your production run would involve larger numbers of chips. Back in the old days (like, mid '70s when VLSI was a struggling baby tech) they had to use some kind of technology whose name I've forgotten, kind of like a silk-screening photographic-negative thinger, and then grow the chips and so forth; the economic break-even point was some huge number of chips, they were doing good to keep failure rates below 5%, etc. These days, think 3D-printing, everything from circuit-design to chip-printing in one data stream, lot-sizes of 1 as economically feasible as a thousand, clean-room becomes an obsolete concept since only the printer internals need to be clean, so forth. Or maybe I'm way out in left field, who knows. |
#6
|
|||
|
|||
WPA handshake files
crankypuss wrote:
On 01/30/2014 03:28 PM, Paul wrote: We're now in the era of custom silicon. I don't know where the venture capital came from to spin custom silicon, but several companies have managed to do it. And they're spinning ridiculously small quantities of chips. You could do their entire production run, with a couple sample wafers from the fab. Really weird economics for silicon. Not normal at all. Normally, when you design custom silicon, your production run would involve larger numbers of chips. Back in the old days (like, mid '70s when VLSI was a struggling baby tech) they had to use some kind of technology whose name I've forgotten, kind of like a silk-screening photographic-negative thinger, and then grow the chips and so forth; the economic break-even point was some huge number of chips, they were doing good to keep failure rates below 5%, etc. These days, think 3D-printing, everything from circuit-design to chip-printing in one data stream, lot-sizes of 1 as economically feasible as a thousand, clean-room becomes an obsolete concept since only the printer internals need to be clean, so forth. Or maybe I'm way out in left field, who knows. They used to do it, by making masks. http://bondatek.com/fabrication-mask.html And the process is photolithography. A wafer might have to go through as many as seventy process steps, before it's finished. And it can mean a wait of 12 weeks, until your wafers "come out of the Easy Bake oven". It's not exactly a fast process. It's painstaking, and in a good fab, most if not all of it uses robots (humans sit around watching TV monitors and LCD screens). In older fabs, there would be more manual handling of product (carrying around sealed containers with wafers inside, from one station to another). http://en.wikipedia.org/wiki/Photolithography At work, the number bandied about was one million per chip, for a set of masks. So if you made a single mistake, you could lose your company a million bucks. For small errors, designs have "spare transistors" which can be connected with an upper layer in the design, and I assume that "patch panel" capability exists for repairing errors with a minimum set of changes to masks. So it doesn't cost you the whole million, but a fraction of that. Another company I worked with, they did a CYA using those transistors, to correct some wiring errors. Then ran off another set of chips. That technique only "works for tiny mistakes", not big ones. The main cost for a tiny mistake, is a 12 week wait for new chips. I only know about that, because they were explaining why they'd be back in three months time :-) There are some university consortia, where students can design chips, and there would be a few instances of that chip on a wafer. So the wafer would have a whole bunch of different chip designs on it. When they have enough designs, they can run off a few of those mixed wafers. So that's how the academic community gets some of their stuff. By sharing a wafer with others, and some government body partially funds the effort. The guys making those Bitcoin hashing chips, I would expect they'd get the whole wafer to themselves. And be paying the non-refundable million bucks for a set of masks, when their design is finished. I have no idea what a processed wafer costs these days, but it's considerably less than the masks. (I guess it all depends on how you plan to pay off the $2 billion bucks it costs to build a fab. The prices I've heard for wafers, makes them sound too cheap compared to the capital cost of the facility to make them.) Paul |
#7
|
|||
|
|||
WPA handshake files
"Paul" wrote
Have you seen the latest hardware table for Bitcoin ? It's hilarious. This will show you, why a processor in the Amazon cloud, doesn't have a chance. Look at the ratio, between a "Hashblaster" and a CPU. https://en.bitcoin.it/wiki/Mining_Hardware_Comparison HashBlaster 3,300,000 megahash/sec $8799 purchase price 7970 video card 700 megahash/sec $ 500 E8400 processor 7 megahash/sec $ 180 The people who bought the video cards, are now "officially screwed" :-) Generations: CPU -- GPU -- FPGA -- Custom Silicon 7 700 3,300,000 We're now in the era of custom silicon. I don't know where the venture capital came from to spin custom silicon, but several companies have managed to do it. And they're spinning ridiculously small quantities of chips. You could do their entire production run, with a couple sample wafers from the fab. Really weird economics for silicon. Not normal at all. Normally, when you design custom silicon, your production run would involve larger numbers of chips. Actually, some of the people who have built bitcoin boxes with multiple video cards, work for a living at busting passwords (penetration testing). So the nice thing about the video cards, is they're re-programmable, and can handle slightly different problems with ease. Paul Still, all this is about as convincing as the now discredited "Greenhouse Effect". Notorious Ponzi Shaman Satoshi Nakamoto distributed hundreds of thousands of free bitcoins for sake of promotion at startup and he kept 400,000 for himself. At startup, the value of a bitcoin was around $0.01 and was used for buying trading cards at Japanese site Mt. Gox which is now bankrupt. We are now only beginning to hear of the tip of the iceberg of the hidden bankruptcies and wasted electric power caused by Satoshi Nakamoto's Ponzi scheme. People are dying: Bitcoin exchange First Meta CEO Autumn Radtke found dead http://www.cbc.ca/news/technology/bi...dead-1.2562077 Satoshi Nakamoto's Ponzi scheme may not be as elaborate, as well known or as hurtful as the "Greenhouse Global Warming" Ponzi scheme but it too used computers and economic theory to transfer wealth from the stupid to the powerful. And yes I managed to get my WPA handshake files uploaded to alt.binaries.comp Thank you. |
#8
|
|||
|
|||
WPA handshake files
Norm X wrote:
"Paul" wrote Have you seen the latest hardware table for Bitcoin ? It's hilarious. This will show you, why a processor in the Amazon cloud, doesn't have a chance. Look at the ratio, between a "Hashblaster" and a CPU. https://en.bitcoin.it/wiki/Mining_Hardware_Comparison HashBlaster 3,300,000 megahash/sec $8799 purchase price 7970 video card 700 megahash/sec $ 500 E8400 processor 7 megahash/sec $ 180 The people who bought the video cards, are now "officially screwed" :-) Generations: CPU -- GPU -- FPGA -- Custom Silicon 7 700 3,300,000 We're now in the era of custom silicon. I don't know where the venture capital came from to spin custom silicon, but several companies have managed to do it. And they're spinning ridiculously small quantities of chips. You could do their entire production run, with a couple sample wafers from the fab. Really weird economics for silicon. Not normal at all. Normally, when you design custom silicon, your production run would involve larger numbers of chips. Actually, some of the people who have built bitcoin boxes with multiple video cards, work for a living at busting passwords (penetration testing). So the nice thing about the video cards, is they're re-programmable, and can handle slightly different problems with ease. Paul Still, all this is about as convincing as the now discredited "Greenhouse Effect". Notorious Ponzi Shaman Satoshi Nakamoto distributed hundreds of thousands of free bitcoins for sake of promotion at startup and he kept 400,000 for himself. At startup, the value of a bitcoin was around $0.01 and was used for buying trading cards at Japanese site Mt. Gox which is now bankrupt. We are now only beginning to hear of the tip of the iceberg of the hidden bankruptcies and wasted electric power caused by Satoshi Nakamoto's Ponzi scheme. People are dying: Bitcoin exchange First Meta CEO Autumn Radtke found dead http://www.cbc.ca/news/technology/bi...dead-1.2562077 Satoshi Nakamoto's Ponzi scheme may not be as elaborate, as well known or as hurtful as the "Greenhouse Global Warming" Ponzi scheme but it too used computers and economic theory to transfer wealth from the stupid to the powerful. And yes I managed to get my WPA handshake files uploaded to alt.binaries.comp Thank you. In a pyramid scheme, it always pays to be on top. I expect Satoshi just wanted to pay off his mortgage. In the picture of him I saw, he didn't really look the part of a super-villain. Paul |
#9
|
|||
|
|||
WPA handshake files
"Paul" wrote
In a pyramid scheme, it always pays to be on top. I expect Satoshi just wanted to pay off his mortgage. In the picture of him I saw, he didn't really look the part of a super-villain. Paul I wonder what classified government work he did? He must be a top crypto-analyst. By comparison, Edward Snowden is a simple snitch. |
#10
|
|||
|
|||
WPA handshake files
I wonder what classified government work he did? He must be a top
crypto-analyst. By comparison, Edward Snowden is a simple snitch. From: http://www.marketoracle.co.uk/Article44728.html "We were doing defensive electronics and communications for the military, government aircraft and warships, but it was classified and I can't really talk about it," David Micha, the president of the company now called L-3 Communications, recalled of the work his former employee did there. Reprinted with permission from Russia Today. |
#11
|
|||
|
|||
WPA handshake files
"Norm X" wrote
I wonder what classified government work he did? He must be a top crypto-analyst. By comparison, Edward Snowden is a simple snitch. From: http://www.marketoracle.co.uk/Article44728.html "We were doing defensive electronics and communications for the military, government aircraft and warships, but it was classified and I can't really talk about it," David Micha, the president of the company now called L-3 Communications, recalled of the work his former employee did there. Reprinted with permission from Russia Today. Assigned to L-3 communication: United States Patent 8,606,171 Haverty December 10, 2013 Methods of suppressing GSM wireless device threats in dynamic or wide area static environments using minimal power consumption and collateral interference Abstract Techniques for detecting wireless devices that are signaling in high proximity to a convoy or other operation and preventing messages from reaching the wireless devices. One class of the techniques uses surgical jamming methodologies that minimize power consumption and collateral interference, while being maximally inconspicuous; another class uses baiting beacons to prevent the messages from reaching the wireless devices. Still another class of techniques denies wireless devices access to a wireless network. An exemplary embodiment applies the techniques to wireless devices and beacons in a GSM network. |
#12
|
|||
|
|||
WPA handshake files
From:
http://www.marketoracle.co.uk/Article44728.html "We were doing defensive electronics and communications for the military, government aircraft and warships, but it was classified and I can't really talk about it," David Micha, the president of the company now called L-3 Communications, recalled of the work his former employee did there. Reprinted with permission from Russia Today. Assigned to L-3 communication: United States Patent 8,606,171 Haverty December 10, 2013 Methods of suppressing GSM wireless device threats in dynamic or wide area static environments using minimal power consumption and collateral interference Abstract Techniques for detecting wireless devices that are signaling in high proximity to a convoy or other operation and preventing messages from reaching the wireless devices. One class of the techniques uses surgical jamming methodologies that minimize power consumption and collateral interference, while being maximally inconspicuous; another class uses baiting beacons to prevent the messages from reaching the wireless devices. Still another class of techniques denies wireless devices access to a wireless network. An exemplary embodiment applies the techniques to wireless devices and beacons in a GSM network. Denial, denial denial. Not only is Satoshi Nakamoto in denial, so is L3 Communications. From Google's cache of http://www.l-3nss.com/ NATIONAL SECURITY SOLUTIONS .... Full-Spectrum Cyber Operations We provide secure communications, information systems' networks and mobile devices, and ensure the integrity of information to facilitate trusted, interconnected, and resilient networked defense. We also provide capabilities to support lawful offensive operations. /// The NSA crowd that invented TOR also invented Bitcoin. |
Thread Tools | |
Display Modes | |
|
|