A Windows XP help forum. PCbanter

If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below.

Go Back   Home » PCbanter forum » Microsoft Windows XP » General XP issues or comments
Site Map Home Register Authors List Search Today's Posts Mark Forums Read Web Partners

WPA handshake files



 
 
Thread Tools Display Modes
  #1  
Old January 28th 14, 05:44 AM posted to alt.comp.hardware,alt.os.linux.ubuntu,microsoft.public.windowsxp.general
Norm X
external usenet poster
 
Posts: 64
Default WPA handshake files

Hi,

This is crossposted. I've asked this question in the crypto newsgroups. I
have a place in mind but I can't remember where. I have collected six WPA
handshake files. Now that I am getting somewhere with high power directional
WiFi, I figure I could collect up to ninety WPA handshake files. WPA
handshake files are tedious to crack or, impossible to crack, in one big
bang time. Or so they say. True randomness is next to impossible.

I don't want to do the work of finding underlying patterns in a collection
of WPA handshake files, but maybe some else will do the research.

My question is, where to find an anonymous upload website where these files
can be placed, stored and then downloaded anonymously? Or maybe a suggestion
for an NNTP newsgroup and storage for maybe a year on a server somewhere?

Anonymously Yours,

X




Ads
  #2  
Old January 28th 14, 08:46 AM posted to alt.comp.hardware,alt.os.linux.ubuntu,microsoft.public.windowsxp.general
Paul
external usenet poster
 
Posts: 18,275
Default WPA handshake files

Norm X wrote:
Hi,

This is crossposted. I've asked this question in the crypto newsgroups. I
have a place in mind but I can't remember where. I have collected six WPA
handshake files. Now that I am getting somewhere with high power directional
WiFi, I figure I could collect up to ninety WPA handshake files. WPA
handshake files are tedious to crack or, impossible to crack, in one big
bang time. Or so they say. True randomness is next to impossible.

I don't want to do the work of finding underlying patterns in a collection
of WPA handshake files, but maybe some else will do the research.

My question is, where to find an anonymous upload website where these files
can be placed, stored and then downloaded anonymously? Or maybe a suggestion
for an NNTP newsgroup and storage for maybe a year on a server somewhere?

Anonymously Yours,

X


Do you really need to crack them, or is it more fun to dream about them ?

http://www.smallnetbuilder.com/wirel...owall=&start=3

Paul
  #3  
Old January 30th 14, 07:25 PM posted to alt.comp.hardware,alt.os.linux.ubuntu,microsoft.public.windowsxp.general
Norm X
external usenet poster
 
Posts: 64
Default WPA handshake files

"Paul" wrote

Norm X wrote:
Hi,

This is crossposted. I've asked this question in the crypto newsgroups. I
have a place in mind but I can't remember where. I have collected six WPA
handshake files. Now that I am getting somewhere with high power
directional WiFi, I figure I could collect up to ninety WPA handshake
files. WPA handshake files are tedious to crack or, impossible to crack,
in one big bang time. Or so they say. True randomness is next to
impossible.

I don't want to do the work of finding underlying patterns in a
collection of WPA handshake files, but maybe some else will do the
research.

My question is, where to find an anonymous upload website where these
files can be placed, stored and then downloaded anonymously? Or maybe a
suggestion for an NNTP newsgroup and storage for maybe a year on a server
somewhere?

Anonymously Yours,

X


Do you really need to crack them, or is it more fun to dream about them ?

http://www.smallnetbuilder.com/wirel...owall=&start=3

Paul


WPA cracking takes prodigious CPU power. Dictionary attacks tend not to
work. Amazon EC2 cloud computing has been around for a while. Now Google
comes to the rescue:

https://developers.google.com/cloud/terms/

I have a modest GPU but it is not supported by a popular Russian WPA cracker
program. Cloud cracking is the way to go.

I cannot understand why people devote GPGPUs to Bitcoin hash computing when
cloud computing is more efficient? Eventually Bitcoin will be cracked and
someone will be much richer, others poorer. Bitcoin is not supported by
government hence no government law enforcement agency will not retaliate.
Anonymous supports Bitcoin. Anonymous will retaliate. I laugh at Anonymous
because I am anonymous.

X



  #4  
Old January 30th 14, 10:28 PM posted to alt.comp.hardware,alt.os.linux.ubuntu,microsoft.public.windowsxp.general
Paul
external usenet poster
 
Posts: 18,275
Default WPA handshake files

Norm X wrote:
"Paul" wrote

Norm X wrote:
Hi,

This is crossposted. I've asked this question in the crypto newsgroups. I
have a place in mind but I can't remember where. I have collected six WPA
handshake files. Now that I am getting somewhere with high power
directional WiFi, I figure I could collect up to ninety WPA handshake
files. WPA handshake files are tedious to crack or, impossible to crack,
in one big bang time. Or so they say. True randomness is next to
impossible.

I don't want to do the work of finding underlying patterns in a
collection of WPA handshake files, but maybe some else will do the
research.

My question is, where to find an anonymous upload website where these
files can be placed, stored and then downloaded anonymously? Or maybe a
suggestion for an NNTP newsgroup and storage for maybe a year on a server
somewhere?

Anonymously Yours,

X

Do you really need to crack them, or is it more fun to dream about them ?

http://www.smallnetbuilder.com/wirel...owall=&start=3

Paul


WPA cracking takes prodigious CPU power. Dictionary attacks tend not to
work. Amazon EC2 cloud computing has been around for a while. Now Google
comes to the rescue:

https://developers.google.com/cloud/terms/

I have a modest GPU but it is not supported by a popular Russian WPA cracker
program. Cloud cracking is the way to go.

I cannot understand why people devote GPGPUs to Bitcoin hash computing when
cloud computing is more efficient? Eventually Bitcoin will be cracked and
someone will be much richer, others poorer. Bitcoin is not supported by
government hence no government law enforcement agency will not retaliate.
Anonymous supports Bitcoin. Anonymous will retaliate. I laugh at Anonymous
because I am anonymous.

X


Have you seen the latest hardware table for Bitcoin ?
It's hilarious. This will show you, why a processor in the
Amazon cloud, doesn't have a chance. Look at the ratio,
between a "Hashblaster" and a CPU.

https://en.bitcoin.it/wiki/Mining_Hardware_Comparison

HashBlaster 3,300,000 megahash/sec $8799 purchase price
7970 video card 700 megahash/sec $ 500
E8400 processor 7 megahash/sec $ 180

The people who bought the video cards, are
now "officially screwed" :-)

Generations:

CPU -- GPU -- FPGA -- Custom Silicon
7 700 3,300,000

We're now in the era of custom silicon. I don't know
where the venture capital came from to spin custom
silicon, but several companies have managed to do it.
And they're spinning ridiculously small quantities of
chips. You could do their entire production run, with
a couple sample wafers from the fab. Really weird
economics for silicon. Not normal at all. Normally,
when you design custom silicon, your production run
would involve larger numbers of chips.

Actually, some of the people who have built bitcoin
boxes with multiple video cards, work for a living
at busting passwords (penetration testing). So the
nice thing about the video cards, is they're re-programmable,
and can handle slightly different problems with ease.

Paul


  #5  
Old January 31st 14, 10:32 AM posted to alt.comp.hardware,alt.os.linux.ubuntu,microsoft.public.windowsxp.general
crankypuss[_2_]
external usenet poster
 
Posts: 2
Default WPA handshake files

On 01/30/2014 03:28 PM, Paul wrote:
We're now in the era of custom silicon. I don't know
where the venture capital came from to spin custom
silicon, but several companies have managed to do it.
And they're spinning ridiculously small quantities of
chips. You could do their entire production run, with
a couple sample wafers from the fab. Really weird
economics for silicon. Not normal at all. Normally,
when you design custom silicon, your production run
would involve larger numbers of chips.


Back in the old days (like, mid '70s when VLSI was a struggling baby
tech) they had to use some kind of technology whose name I've forgotten,
kind of like a silk-screening photographic-negative thinger, and then
grow the chips and so forth; the economic break-even point was some huge
number of chips, they were doing good to keep failure rates below 5%, etc.

These days, think 3D-printing, everything from circuit-design to
chip-printing in one data stream, lot-sizes of 1 as economically
feasible as a thousand, clean-room becomes an obsolete concept since
only the printer internals need to be clean, so forth.

Or maybe I'm way out in left field, who knows.
  #6  
Old January 31st 14, 02:44 PM posted to alt.comp.hardware,alt.os.linux.ubuntu,microsoft.public.windowsxp.general
Paul
external usenet poster
 
Posts: 18,275
Default WPA handshake files

crankypuss wrote:
On 01/30/2014 03:28 PM, Paul wrote:
We're now in the era of custom silicon. I don't know
where the venture capital came from to spin custom
silicon, but several companies have managed to do it.
And they're spinning ridiculously small quantities of
chips. You could do their entire production run, with
a couple sample wafers from the fab. Really weird
economics for silicon. Not normal at all. Normally,
when you design custom silicon, your production run
would involve larger numbers of chips.


Back in the old days (like, mid '70s when VLSI was a struggling baby
tech) they had to use some kind of technology whose name I've forgotten,
kind of like a silk-screening photographic-negative thinger, and then
grow the chips and so forth; the economic break-even point was some huge
number of chips, they were doing good to keep failure rates below 5%, etc.

These days, think 3D-printing, everything from circuit-design to
chip-printing in one data stream, lot-sizes of 1 as economically
feasible as a thousand, clean-room becomes an obsolete concept since
only the printer internals need to be clean, so forth.

Or maybe I'm way out in left field, who knows.


They used to do it, by making masks.

http://bondatek.com/fabrication-mask.html

And the process is photolithography. A wafer might have to go
through as many as seventy process steps, before it's finished.
And it can mean a wait of 12 weeks, until your wafers "come out
of the Easy Bake oven". It's not exactly a fast process. It's
painstaking, and in a good fab, most if not all of it uses
robots (humans sit around watching TV monitors and LCD screens).
In older fabs, there would be more manual handling of product
(carrying around sealed containers with wafers inside, from
one station to another).

http://en.wikipedia.org/wiki/Photolithography

At work, the number bandied about was one million per chip,
for a set of masks. So if you made a single mistake, you
could lose your company a million bucks. For small errors,
designs have "spare transistors" which can be connected with
an upper layer in the design, and I assume that "patch panel"
capability exists for repairing errors with a minimum set of
changes to masks. So it doesn't cost you the whole million,
but a fraction of that. Another company I worked with, they
did a CYA using those transistors, to correct some wiring
errors. Then ran off another set of chips. That technique
only "works for tiny mistakes", not big ones. The main cost
for a tiny mistake, is a 12 week wait for new chips. I
only know about that, because they were explaining why
they'd be back in three months time :-)

There are some university consortia, where students can
design chips, and there would be a few instances of that
chip on a wafer. So the wafer would have a whole bunch
of different chip designs on it. When they have enough
designs, they can run off a few of those mixed wafers.
So that's how the academic community gets some of their
stuff. By sharing a wafer with others, and some government
body partially funds the effort.

The guys making those Bitcoin hashing chips, I would
expect they'd get the whole wafer to themselves. And
be paying the non-refundable million bucks for
a set of masks, when their design is finished.
I have no idea what a processed wafer costs these
days, but it's considerably less than the masks.
(I guess it all depends on how you plan to pay off
the $2 billion bucks it costs to build a fab. The prices
I've heard for wafers, makes them sound too cheap compared
to the capital cost of the facility to make them.)

Paul
  #7  
Old March 7th 14, 10:58 PM posted to alt.comp.hardware,alt.os.linux.ubuntu,microsoft.public.windowsxp.general
Norm X
external usenet poster
 
Posts: 64
Default WPA handshake files

"Paul" wrote

Have you seen the latest hardware table for Bitcoin ?
It's hilarious. This will show you, why a processor in the
Amazon cloud, doesn't have a chance. Look at the ratio,
between a "Hashblaster" and a CPU.

https://en.bitcoin.it/wiki/Mining_Hardware_Comparison

HashBlaster 3,300,000 megahash/sec $8799 purchase price
7970 video card 700 megahash/sec $ 500
E8400 processor 7 megahash/sec $ 180

The people who bought the video cards, are
now "officially screwed" :-)

Generations:

CPU -- GPU -- FPGA -- Custom Silicon
7 700 3,300,000

We're now in the era of custom silicon. I don't know
where the venture capital came from to spin custom
silicon, but several companies have managed to do it.
And they're spinning ridiculously small quantities of
chips. You could do their entire production run, with
a couple sample wafers from the fab. Really weird
economics for silicon. Not normal at all. Normally,
when you design custom silicon, your production run
would involve larger numbers of chips.

Actually, some of the people who have built bitcoin
boxes with multiple video cards, work for a living
at busting passwords (penetration testing). So the
nice thing about the video cards, is they're re-programmable,
and can handle slightly different problems with ease.

Paul


Still, all this is about as convincing as the now discredited "Greenhouse
Effect".

Notorious Ponzi Shaman Satoshi Nakamoto distributed hundreds of thousands of
free bitcoins for sake of promotion at startup and he kept 400,000 for
himself. At startup, the value of a bitcoin was around $0.01 and was used
for buying trading cards at Japanese site Mt. Gox which is now bankrupt. We
are now only beginning to hear of the tip of the iceberg of the hidden
bankruptcies and wasted electric power caused by Satoshi Nakamoto's Ponzi
scheme.

People are dying:

Bitcoin exchange First Meta CEO Autumn Radtke found dead
http://www.cbc.ca/news/technology/bi...dead-1.2562077

Satoshi Nakamoto's Ponzi scheme may not be as elaborate, as well known or as
hurtful as the "Greenhouse Global Warming" Ponzi scheme but it too used
computers and economic theory to transfer wealth from the stupid to the
powerful.

And yes I managed to get my WPA handshake files uploaded to
alt.binaries.comp Thank you.


  #8  
Old March 8th 14, 02:21 AM posted to alt.comp.hardware,alt.os.linux.ubuntu,microsoft.public.windowsxp.general
Paul
external usenet poster
 
Posts: 18,275
Default WPA handshake files

Norm X wrote:
"Paul" wrote
Have you seen the latest hardware table for Bitcoin ?
It's hilarious. This will show you, why a processor in the
Amazon cloud, doesn't have a chance. Look at the ratio,
between a "Hashblaster" and a CPU.

https://en.bitcoin.it/wiki/Mining_Hardware_Comparison

HashBlaster 3,300,000 megahash/sec $8799 purchase price
7970 video card 700 megahash/sec $ 500
E8400 processor 7 megahash/sec $ 180

The people who bought the video cards, are
now "officially screwed" :-)

Generations:

CPU -- GPU -- FPGA -- Custom Silicon
7 700 3,300,000

We're now in the era of custom silicon. I don't know
where the venture capital came from to spin custom
silicon, but several companies have managed to do it.
And they're spinning ridiculously small quantities of
chips. You could do their entire production run, with
a couple sample wafers from the fab. Really weird
economics for silicon. Not normal at all. Normally,
when you design custom silicon, your production run
would involve larger numbers of chips.

Actually, some of the people who have built bitcoin
boxes with multiple video cards, work for a living
at busting passwords (penetration testing). So the
nice thing about the video cards, is they're re-programmable,
and can handle slightly different problems with ease.

Paul


Still, all this is about as convincing as the now discredited "Greenhouse
Effect".

Notorious Ponzi Shaman Satoshi Nakamoto distributed hundreds of thousands of
free bitcoins for sake of promotion at startup and he kept 400,000 for
himself. At startup, the value of a bitcoin was around $0.01 and was used
for buying trading cards at Japanese site Mt. Gox which is now bankrupt. We
are now only beginning to hear of the tip of the iceberg of the hidden
bankruptcies and wasted electric power caused by Satoshi Nakamoto's Ponzi
scheme.

People are dying:

Bitcoin exchange First Meta CEO Autumn Radtke found dead
http://www.cbc.ca/news/technology/bi...dead-1.2562077

Satoshi Nakamoto's Ponzi scheme may not be as elaborate, as well known or as
hurtful as the "Greenhouse Global Warming" Ponzi scheme but it too used
computers and economic theory to transfer wealth from the stupid to the
powerful.

And yes I managed to get my WPA handshake files uploaded to
alt.binaries.comp Thank you.


In a pyramid scheme, it always pays to be on top.

I expect Satoshi just wanted to pay off his mortgage.
In the picture of him I saw, he didn't really
look the part of a super-villain.

Paul
  #9  
Old March 8th 14, 08:08 AM posted to alt.comp.hardware,alt.os.linux.ubuntu,microsoft.public.windowsxp.general
Norm X
external usenet poster
 
Posts: 64
Default WPA handshake files

"Paul" wrote

In a pyramid scheme, it always pays to be on top.

I expect Satoshi just wanted to pay off his mortgage.
In the picture of him I saw, he didn't really
look the part of a super-villain.

Paul


I wonder what classified government work he did? He must be a top
crypto-analyst. By comparison, Edward Snowden is a simple snitch.


  #10  
Old March 8th 14, 09:27 AM posted to alt.comp.hardware,alt.os.linux.ubuntu,microsoft.public.windowsxp.general
Norm X
external usenet poster
 
Posts: 64
Default WPA handshake files

I wonder what classified government work he did? He must be a top
crypto-analyst. By comparison, Edward Snowden is a simple snitch.


From:
http://www.marketoracle.co.uk/Article44728.html

"We were doing defensive electronics and communications for the military,
government aircraft and warships, but it was classified and I can't really
talk about it," David Micha, the president of the company now called L-3
Communications, recalled of the work his former employee did there.

Reprinted with permission from Russia Today.


  #11  
Old March 8th 14, 08:44 PM posted to alt.comp.hardware,alt.os.linux.ubuntu,microsoft.public.windowsxp.general
Norm X
external usenet poster
 
Posts: 64
Default WPA handshake files

"Norm X" wrote

I wonder what classified government work he did? He must be a top
crypto-analyst. By comparison, Edward Snowden is a simple snitch.


From:
http://www.marketoracle.co.uk/Article44728.html

"We were doing defensive electronics and communications for the military,
government aircraft and warships, but it was classified and I can't really
talk about it," David Micha, the president of the company now called L-3
Communications, recalled of the work his former employee did there.

Reprinted with permission from Russia Today.


Assigned to L-3 communication:

United States Patent 8,606,171
Haverty December 10, 2013
Methods of suppressing GSM wireless device threats in dynamic or wide area
static environments using minimal power consumption and collateral
interference

Abstract

Techniques for detecting wireless devices that are signaling in high
proximity to a convoy or other operation and preventing messages from
reaching the wireless devices. One class of the techniques uses surgical
jamming methodologies that minimize power consumption and collateral
interference, while being maximally inconspicuous; another class uses
baiting beacons to prevent the messages from reaching the wireless devices.
Still another class of techniques denies wireless devices access to a
wireless network. An exemplary embodiment applies the techniques to wireless
devices and beacons in a GSM network.


  #12  
Old March 10th 14, 05:26 AM posted to alt.comp.hardware,alt.os.linux.ubuntu,microsoft.public.windowsxp.general
Norm X
external usenet poster
 
Posts: 64
Default WPA handshake files

From:
http://www.marketoracle.co.uk/Article44728.html

"We were doing defensive electronics and communications for the military,
government aircraft and warships, but it was classified and I can't
really talk about it," David Micha, the president of the company now
called L-3 Communications, recalled of the work his former employee did
there.

Reprinted with permission from Russia Today.


Assigned to L-3 communication:

United States Patent 8,606,171
Haverty December 10, 2013
Methods of suppressing GSM wireless device threats in dynamic or wide area
static environments using minimal power consumption and collateral
interference

Abstract

Techniques for detecting wireless devices that are signaling in high
proximity to a convoy or other operation and preventing messages from
reaching the wireless devices. One class of the techniques uses surgical
jamming methodologies that minimize power consumption and collateral
interference, while being maximally inconspicuous; another class uses
baiting beacons to prevent the messages from reaching the wireless
devices. Still another class of techniques denies wireless devices access
to a wireless network. An exemplary embodiment applies the techniques to
wireless devices and beacons in a GSM network.


Denial, denial denial. Not only is Satoshi Nakamoto in denial, so is L3
Communications.

From Google's cache of http://www.l-3nss.com/

NATIONAL SECURITY SOLUTIONS

....

Full-Spectrum Cyber Operations

We provide secure communications, information systems' networks and mobile
devices, and ensure the integrity of information to facilitate trusted,
interconnected, and resilient networked defense. We also provide
capabilities to support lawful offensive operations.

///

The NSA crowd that invented TOR also invented Bitcoin.


 




Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is Off
HTML code is Off






All times are GMT +1. The time now is 12:20 PM.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Copyright ©2004-2024 PCbanter.
The comments are property of their posters.