WPA handshake files

  • Thread starter Thread starter Norm X
  • Start date Start date
N

Norm X

Hi,

This is crossposted. I've asked this question in the crypto newsgroups. I
have a place in mind but I can't remember where. I have collected six WPA
handshake files. Now that I am getting somewhere with high power directional
WiFi, I figure I could collect up to ninety WPA handshake files. WPA
handshake files are tedious to crack or, impossible to crack, in one big
bang time. Or so they say. True randomness is next to impossible.

I don't want to do the work of finding underlying patterns in a collection
of WPA handshake files, but maybe some else will do the research.

My question is, where to find an anonymous upload website where these files
can be placed, stored and then downloaded anonymously? Or maybe a suggestion
for an NNTP newsgroup and storage for maybe a year on a server somewhere?

Anonymously Yours,

X
 
Norm said:
Hi,

This is crossposted. I've asked this question in the crypto newsgroups. I
have a place in mind but I can't remember where. I have collected six WPA
handshake files. Now that I am getting somewhere with high power directional
WiFi, I figure I could collect up to ninety WPA handshake files. WPA
handshake files are tedious to crack or, impossible to crack, in one big
bang time. Or so they say. True randomness is next to impossible.

I don't want to do the work of finding underlying patterns in a collection
of WPA handshake files, but maybe some else will do the research.

My question is, where to find an anonymous upload website where these files
can be placed, stored and then downloaded anonymously? Or maybe a suggestion
for an NNTP newsgroup and storage for maybe a year on a server somewhere?

Anonymously Yours,

X

Do you really need to crack them, or is it more fun to dream about them ?

http://www.smallnetbuilder.com/wireless/wireless-howto/30278-how-to-crack-wpa-wpa2?showall=&start=3

Paul
 
"Paul" wrote
Do you really need to crack them, or is it more fun to dream about them ?

http://www.smallnetbuilder.com/wireless/wireless-howto/30278-how-to-crack-wpa-wpa2?showall=&start=3

Paul

WPA cracking takes prodigious CPU power. Dictionary attacks tend not to
work. Amazon EC2 cloud computing has been around for a while. Now Google
comes to the rescue:

https://developers.google.com/cloud/terms/

I have a modest GPU but it is not supported by a popular Russian WPA cracker
program. Cloud cracking is the way to go.

I cannot understand why people devote GPGPUs to Bitcoin hash computing when
cloud computing is more efficient? Eventually Bitcoin will be cracked and
someone will be much richer, others poorer. Bitcoin is not supported by
government hence no government law enforcement agency will not retaliate.
Anonymous supports Bitcoin. Anonymous will retaliate. I laugh at Anonymous
because I am anonymous.

X
 
Norm said:
"Paul" wrote


WPA cracking takes prodigious CPU power. Dictionary attacks tend not to
work. Amazon EC2 cloud computing has been around for a while. Now Google
comes to the rescue:

https://developers.google.com/cloud/terms/

I have a modest GPU but it is not supported by a popular Russian WPA cracker
program. Cloud cracking is the way to go.

I cannot understand why people devote GPGPUs to Bitcoin hash computing when
cloud computing is more efficient? Eventually Bitcoin will be cracked and
someone will be much richer, others poorer. Bitcoin is not supported by
government hence no government law enforcement agency will not retaliate.
Anonymous supports Bitcoin. Anonymous will retaliate. I laugh at Anonymous
because I am anonymous.

X

Have you seen the latest hardware table for Bitcoin ?
It's hilarious. This will show you, why a processor in the
Amazon cloud, doesn't have a chance. Look at the ratio,
between a "Hashblaster" and a CPU.

https://en.bitcoin.it/wiki/Mining_Hardware_Comparison

HashBlaster 3,300,000 megahash/sec $8799 purchase price
7970 video card 700 megahash/sec $ 500
E8400 processor 7 megahash/sec $ 180

The people who bought the video cards, are
now "officially screwed" :-)

Generations:

CPU --> GPU --> FPGA --> Custom Silicon
7 700 3,300,000

We're now in the era of custom silicon. I don't know
where the venture capital came from to spin custom
silicon, but several companies have managed to do it.
And they're spinning ridiculously small quantities of
chips. You could do their entire production run, with
a couple sample wafers from the fab. Really weird
economics for silicon. Not normal at all. Normally,
when you design custom silicon, your production run
would involve larger numbers of chips.

Actually, some of the people who have built bitcoin
boxes with multiple video cards, work for a living
at busting passwords (penetration testing). So the
nice thing about the video cards, is they're re-programmable,
and can handle slightly different problems with ease.

Paul
 
We're now in the era of custom silicon. I don't know
where the venture capital came from to spin custom
silicon, but several companies have managed to do it.
And they're spinning ridiculously small quantities of
chips. You could do their entire production run, with
a couple sample wafers from the fab. Really weird
economics for silicon. Not normal at all. Normally,
when you design custom silicon, your production run
would involve larger numbers of chips.

Back in the old days (like, mid '70s when VLSI was a struggling baby
tech) they had to use some kind of technology whose name I've forgotten,
kind of like a silk-screening photographic-negative thinger, and then
grow the chips and so forth; the economic break-even point was some huge
number of chips, they were doing good to keep failure rates below 5%, etc.

These days, think 3D-printing, everything from circuit-design to
chip-printing in one data stream, lot-sizes of 1 as economically
feasible as a thousand, clean-room becomes an obsolete concept since
only the printer internals need to be clean, so forth.

Or maybe I'm way out in left field, who knows.
 
crankypuss said:
Back in the old days (like, mid '70s when VLSI was a struggling baby
tech) they had to use some kind of technology whose name I've forgotten,
kind of like a silk-screening photographic-negative thinger, and then
grow the chips and so forth; the economic break-even point was some huge
number of chips, they were doing good to keep failure rates below 5%, etc.

These days, think 3D-printing, everything from circuit-design to
chip-printing in one data stream, lot-sizes of 1 as economically
feasible as a thousand, clean-room becomes an obsolete concept since
only the printer internals need to be clean, so forth.

Or maybe I'm way out in left field, who knows.

They used to do it, by making masks.

http://bondatek.com/fabrication-mask.html

And the process is photolithography. A wafer might have to go
through as many as seventy process steps, before it's finished.
And it can mean a wait of 12 weeks, until your wafers "come out
of the Easy Bake oven". It's not exactly a fast process. It's
painstaking, and in a good fab, most if not all of it uses
robots (humans sit around watching TV monitors and LCD screens).
In older fabs, there would be more manual handling of product
(carrying around sealed containers with wafers inside, from
one station to another).

http://en.wikipedia.org/wiki/Photolithography

At work, the number bandied about was one million per chip,
for a set of masks. So if you made a single mistake, you
could lose your company a million bucks. For small errors,
designs have "spare transistors" which can be connected with
an upper layer in the design, and I assume that "patch panel"
capability exists for repairing errors with a minimum set of
changes to masks. So it doesn't cost you the whole million,
but a fraction of that. Another company I worked with, they
did a CYA using those transistors, to correct some wiring
errors. Then ran off another set of chips. That technique
only "works for tiny mistakes", not big ones. The main cost
for a tiny mistake, is a 12 week wait for new chips. I
only know about that, because they were explaining why
they'd be back in three months time :-)

There are some university consortia, where students can
design chips, and there would be a few instances of that
chip on a wafer. So the wafer would have a whole bunch
of different chip designs on it. When they have enough
designs, they can run off a few of those mixed wafers.
So that's how the academic community gets some of their
stuff. By sharing a wafer with others, and some government
body partially funds the effort.

The guys making those Bitcoin hashing chips, I would
expect they'd get the whole wafer to themselves. And
be paying the non-refundable million bucks for
a set of masks, when their design is finished.
I have no idea what a processed wafer costs these
days, but it's considerably less than the masks.
(I guess it all depends on how you plan to pay off
the $2 billion bucks it costs to build a fab. The prices
I've heard for wafers, makes them sound too cheap compared
to the capital cost of the facility to make them.)

Paul
 
"Paul" wrote
Have you seen the latest hardware table for Bitcoin ?
It's hilarious. This will show you, why a processor in the
Amazon cloud, doesn't have a chance. Look at the ratio,
between a "Hashblaster" and a CPU.

https://en.bitcoin.it/wiki/Mining_Hardware_Comparison

HashBlaster 3,300,000 megahash/sec $8799 purchase price
7970 video card 700 megahash/sec $ 500
E8400 processor 7 megahash/sec $ 180

The people who bought the video cards, are
now "officially screwed" :-)

Generations:

CPU --> GPU --> FPGA --> Custom Silicon
7 700 3,300,000

We're now in the era of custom silicon. I don't know
where the venture capital came from to spin custom
silicon, but several companies have managed to do it.
And they're spinning ridiculously small quantities of
chips. You could do their entire production run, with
a couple sample wafers from the fab. Really weird
economics for silicon. Not normal at all. Normally,
when you design custom silicon, your production run
would involve larger numbers of chips.

Actually, some of the people who have built bitcoin
boxes with multiple video cards, work for a living
at busting passwords (penetration testing). So the
nice thing about the video cards, is they're re-programmable,
and can handle slightly different problems with ease.

Paul

Still, all this is about as convincing as the now discredited "Greenhouse
Effect".

Notorious Ponzi Shaman Satoshi Nakamoto distributed hundreds of thousands of
free bitcoins for sake of promotion at startup and he kept 400,000 for
himself. At startup, the value of a bitcoin was around $0.01 and was used
for buying trading cards at Japanese site Mt. Gox which is now bankrupt. We
are now only beginning to hear of the tip of the iceberg of the hidden
bankruptcies and wasted electric power caused by Satoshi Nakamoto's Ponzi
scheme.

People are dying:

Bitcoin exchange First Meta CEO Autumn Radtke found dead
http://www.cbc.ca/news/technology/bitcoin-exchange-first-meta-ceo-autumn-radtke-found-dead-1.2562077

Satoshi Nakamoto's Ponzi scheme may not be as elaborate, as well known or as
hurtful as the "Greenhouse Global Warming" Ponzi scheme but it too used
computers and economic theory to transfer wealth from the stupid to the
powerful.

And yes I managed to get my WPA handshake files uploaded to
alt.binaries.comp Thank you.
 
Norm said:
"Paul" wrote

Still, all this is about as convincing as the now discredited "Greenhouse
Effect".

Notorious Ponzi Shaman Satoshi Nakamoto distributed hundreds of thousands of
free bitcoins for sake of promotion at startup and he kept 400,000 for
himself. At startup, the value of a bitcoin was around $0.01 and was used
for buying trading cards at Japanese site Mt. Gox which is now bankrupt. We
are now only beginning to hear of the tip of the iceberg of the hidden
bankruptcies and wasted electric power caused by Satoshi Nakamoto's Ponzi
scheme.

People are dying:

Bitcoin exchange First Meta CEO Autumn Radtke found dead
http://www.cbc.ca/news/technology/bitcoin-exchange-first-meta-ceo-autumn-radtke-found-dead-1.2562077

Satoshi Nakamoto's Ponzi scheme may not be as elaborate, as well known or as
hurtful as the "Greenhouse Global Warming" Ponzi scheme but it too used
computers and economic theory to transfer wealth from the stupid to the
powerful.

And yes I managed to get my WPA handshake files uploaded to
alt.binaries.comp Thank you.

In a pyramid scheme, it always pays to be on top.

I expect Satoshi just wanted to pay off his mortgage.
In the picture of him I saw, he didn't really
look the part of a super-villain.

Paul
 
In a pyramid scheme, it always pays to be on top.

I expect Satoshi just wanted to pay off his mortgage.
In the picture of him I saw, he didn't really
look the part of a super-villain.

Paul

I wonder what classified government work he did? He must be a top
crypto-analyst. By comparison, Edward Snowden is a simple snitch.
 
I wonder what classified government work he did? He must be a top
crypto-analyst. By comparison, Edward Snowden is a simple snitch.

From:
http://www.marketoracle.co.uk/Article44728.html

"We were doing defensive electronics and communications for the military,
government aircraft and warships, but it was classified and I can't really
talk about it," David Micha, the president of the company now called L-3
Communications, recalled of the work his former employee did there.

Reprinted with permission from Russia Today.
 
From:
http://www.marketoracle.co.uk/Article44728.html

"We were doing defensive electronics and communications for the military,
government aircraft and warships, but it was classified and I can't really
talk about it," David Micha, the president of the company now called L-3
Communications, recalled of the work his former employee did there.

Reprinted with permission from Russia Today.

Assigned to L-3 communication:

United States Patent 8,606,171
Haverty December 10, 2013
Methods of suppressing GSM wireless device threats in dynamic or wide area
static environments using minimal power consumption and collateral
interference

Abstract

Techniques for detecting wireless devices that are signaling in high
proximity to a convoy or other operation and preventing messages from
reaching the wireless devices. One class of the techniques uses surgical
jamming methodologies that minimize power consumption and collateral
interference, while being maximally inconspicuous; another class uses
baiting beacons to prevent the messages from reaching the wireless devices.
Still another class of techniques denies wireless devices access to a
wireless network. An exemplary embodiment applies the techniques to wireless
devices and beacons in a GSM network.
 
From:
Assigned to L-3 communication:

United States Patent 8,606,171
Haverty December 10, 2013
Methods of suppressing GSM wireless device threats in dynamic or wide area
static environments using minimal power consumption and collateral
interference

Abstract

Techniques for detecting wireless devices that are signaling in high
proximity to a convoy or other operation and preventing messages from
reaching the wireless devices. One class of the techniques uses surgical
jamming methodologies that minimize power consumption and collateral
interference, while being maximally inconspicuous; another class uses
baiting beacons to prevent the messages from reaching the wireless
devices. Still another class of techniques denies wireless devices access
to a wireless network. An exemplary embodiment applies the techniques to
wireless devices and beacons in a GSM network.

Denial, denial denial. Not only is Satoshi Nakamoto in denial, so is L3
Communications.

From Google's cache of http://www.l-3nss.com/

NATIONAL SECURITY SOLUTIONS

....

Full-Spectrum Cyber Operations

We provide secure communications, information systems' networks and mobile
devices, and ensure the integrity of information to facilitate trusted,
interconnected, and resilient networked defense. We also provide
capabilities to support lawful offensive operations.

///

The NSA crowd that invented TOR also invented Bitcoin.
 
Back
Top