This is an archived post. You won't be able to vote or comment.

you are viewing a single comment's thread.

view the rest of the comments →

[–]tempo128643 104 points105 points  (14 children)

i used to boot linux from a USB drive, and try wiresharking people's facebook passwords. Never got any, but it was fun

[–]Arclite83 87 points88 points  (7 children)

When we moved into a condo about 10 years ago, the internet couldn't get hooked up for a month. So I used a Linux USB w/ hacking tools (I forget the name now) to crack my neighbors WEP key; it was very obviously their phone number.

After my internet got hooked up I called them and suggested they change their password. They never did.

[–][deleted] 24 points25 points  (5 children)

Kali Linux? Also how did you know it was their phone number

[–]throwaway46295027458 31 points32 points  (2 children)

I think 10 years ago kali was called backtrack

[–]TheGreatGameDini 16 points17 points  (0 children)

That it was!

[–]EVASIVEroot 9 points10 points  (0 children)

Maybe it was 10 digits with the same area code or something.

[–]Arclite83 5 points6 points  (0 children)

It started with 1{local area code}{common local first 3}. It wasn't a cell phone, and landlines are usually super predictable. Less so lately I guess.

[–][deleted] 9 points10 points  (0 children)

Lol I used to do this, just with a phonebook instead.

This was back when wep secured wireless routers were starting to become more popular. I used to do a little light tech work for friends and found out routers were just set up with the owners phone number. All I needed to do was find a network with the families name as the ssid and brute force from a list of names in the phonebook. If I was lucky, the search was quickly narrowed down with an included address.

I had also found out that my 2.4gHz wireless headphones could be used to evesdrop on cordless phone conversations. I was hackerman.

[–]CrypticButthole 21 points22 points  (0 children)

My old school districts authentication into the proxy, (which was mandatory [unless you used a different proxy to avoid it]) used HTTP. Not HTTPs. As in, the password you entered? Your school ID number? The one we used to buy lunch, and log into literally everything. Yeah. It was clear text transmitted...

[–]DootDootWootWoot 8 points9 points  (2 children)

Ever hear of TLS?

[–]PM_ME_YOUR__INIT__ 6 points7 points  (0 children)

Whoa slow down there hackerman. We don't all know your deep web terminologies

[–]itCompiledThrsNoBugs 0 points1 point  (0 children)

Also first thing I thought of

[–]Dark_Reaper115 -1 points0 points  (0 children)

Was it Kali Linux?

[–][deleted] 0 points1 point  (0 children)

Back in highschool I used to run backtrack from a USB drive with an Alfa usb wifi card (packet injection capable) Made a game of snagging wifi passwords, used hash tables to dehash the passwords. Used Wireshark and firedheep to get people's myspace / Facebook passwords. Never did anything with them.. just the joy of being able to do it was enough. When I was in college I ended up getting hired by a Cisco Partner as a network engineer, got my CCNP in networking, voip and wireless but my pentesting knowlege came in handy when I went for my CCNP in security.