Credits: The Joker / CHF
There are two methods of hacking; locally, or globally. There are an infinite amount of subsets to the following ideas, but let us cover as much as we can. The following is one part of several parts of the tutorial that will later be posted. Let us start off with the first scenario.
Local Hacking
This method normally consists gaining access some way or another via the intranet. Let us test the following method. (Note, everything highlighted in yellow is code, what you type in the terminal)
-Wireless Hacking
Let us set up a scenario here. You are eager to gain access to a non-specific, (or specific, if you have an apparent grudge with a mean neighbor) to a local computer. Here are the tools needed to gain access before we go on our mission.
* Laptop with dual boot, (preferably BackTrack 2 for Linux, and the second boot being Windows XP Pro)
* A CD
* Deepburner, so you can burn your .ISO image to your CD.
* Supported wireless card for injection to work properly (please see the list found
There are two methods of hacking; locally, or globally. There are an infinite amount of subsets to the following ideas, but let us cover as much as we can. The following is one part of several parts of the tutorial that will later be posted. Let us start off with the first scenario.
Local Hacking
This method normally consists gaining access some way or another via the intranet. Let us test the following method. (Note, everything highlighted in yellow is code, what you type in the terminal)
-Wireless Hacking
Let us set up a scenario here. You are eager to gain access to a non-specific, (or specific, if you have an apparent grudge with a mean neighbor) to a local computer. Here are the tools needed to gain access before we go on our mission.
* Laptop with dual boot, (preferably BackTrack 2 for Linux, and the second boot being Windows XP Pro)
* A CD
* Deepburner, so you can burn your .ISO image to your CD.
* Supported wireless card for injection to work properly (please see the list found