Xprobe2 For Windows
Welcome back, my neophyte hackers! Have you ever had a neighbor that you're certain is up to no good? Maybe you've seen him moving packages in and out at all hours of the night? Maybe you've seen people go into his home and never come out? He seems like a creep and sometimes you hear strange sounds coming from his home? You know he's up to no good, but you aren't sure what it is exactly.
Let's say I have such a neighbor. I've called the police about his suspicious activities, but they don't take me seriously. They think I am just a nosy, suspicious neighbor. They asked me what kind of evidence I have that he's doing something illegal. Of course, I have nothing other than my suspicions and circumstantial evidence of the comings and going from that home. What can I do?
In this hack, I will show you ways that you can find out what that suspicious neighbor is actually up to. This will require skills from multiple tutorials on here, so if you're a newbie, be patient and go through the guides I reference for you. Download Game Pokemon Ash Gray 3.6.1 here.
Step 1: Crack His Wi-Fi The first step is to crack his Wi-Fi. If we can get a connection to his Wi-Fi router/AP, we can connect to it and be inside his LAN. Let's open and use aircarck-ng to crack his wireless. If you need more information on cracking Wi-Fi, check out and on.
First, we need to put our wireless card in monitor mode. We can do that with: • bt >airmon-ng start wlan0 Then we need to start airodump-ng. This application allows us to 'dump' all the info on available wireless devices to our screen: • bt >airodump-ng mon0 As you can see below, I have a lot of wireless access points in my neighborhood. I also have a high gain antenna on my wireless card, so I am picking up wireless from blocks around.
My next step is to figure which of these is my creepy neighbor's AP. Since he is just few houses away, his signal would be relatively strong. The second column, PWR, gives me the power of the signal. Lower numbers are more powerful. I'm guessing he is SSID 'myquest3231,' the fifth AP on my list. I know this because when I drove by his house a couple of days ago with my laptop and wireless in monitor mode, it was the strongest signal when I was in his vicinity. There is no way to know definitively, but that is my best guess.
How can the answer be improved?
If it doesn't work, I'll try another. Now we need to break the WPA2 encryption to get into his network. The first step in WPA2 cracking is to lock onto his AP and capture his password hash. Adobe Photoshop Cs6 Full Crack there.
We can do this with the airodump-ng command and then forcing him to reauthenticate by bumping him off his AP with a deauthenticate (deauth) sent with the airoreplay-ng command. Check out my guide on for help on this. It may take a few hours, but now I have his WPA2 password and I'm inside his network! Step 2: Enumerate with Netdiscover Now that we're connected to his wireless network, let's see what systems are on his network. In an earlier tutorial, I showed you how to. Let's find out what systems he has INSIDE his home that we might be able to exploit.