Seriously, for dose of u dat av dial dis code b4 and didnt work on ur sim, try it naw it will work cos i also tried it b4 it didnt work… Whatsapp @ 08060518174
To ma surprise today i got 200mb each on ma airtel sim…
I swear to God….
Free Airtel MB subscription codes:
1. dial *948*1# for free whatsapp megabytes….
2. Dial *141*13*1# for free day megabytes….
3. Dial *141*13*15# for 5mb with #5
4. *141*13*50#
5. *141*13*100#
6. *141*13*200#
7. *758*10#
dial *885*0# to check ur whatsapp data mb….
Dial *223# or *123*10# to check ur other megabytes
Let's Begin
So.. Here’s how we do it..
1) First we need to scan for
available wireless networks.
Theres this great tool for
windows to do this.. called
“NetStumbler” or Kismet for
Windows and Linux and KisMac
for Mac
It’ll also show how the Wi-fi
network is secured..
The two most common
encryption types are
br />
1. WEP
2. WAP
WEP i.e Wire Equivalent Privacy
is not consideres as safe as WAP
i.e Wireless Application
Protocol.
WEPhave many flaws that
allows a hacker to crack a WEP
key easily.. whereas
WAPis currently the most
secure and best option to
secure a wi-fi network..
It can’t be easily cracked as WEP
because the only way to retreive
a WAP key is to use a brute-force
attack or dictionary atack.
Here I’ll tell you how to Crack
WEP
To crack WEP we will be using
Live Linux distribution called
BackTrack to crack WEP.
BackTrack have lots of
preinstalled softwares for this
very purpose..
Thetools we will be using on
Backtrack are
br />
Kismet – a wireless network
detector
airodump – captures packets
from a wireless router
aireplay – forges ARP requests
aircrack – decrypts the WEP keys
1. First of all we have to find a
wireless access point along with
its bssid, essid and channel
number. To do this we will run
kismet by opening up the
terminal and typing in kismet. It
may ask you for the appropriate
adapter which in my case is
ath0. You can see your device’s
name by typing in the command
iwconfig.
2.To be able to do some of the
later things, your wireless
adapter must be put into
monitor mode. Kismet
automatically does this and as
long as you keep it open, your
wireless adapter will stay in
monitor mode.
3. In kismet you will see the flags
Y/N/0. Each one stands for a
different type of encryption. In
our case we will be looking for
access points with the WEP
encryption. Y=WEP N=OPEN
0=OTHER(usually WAP).
4.Once you find an access point,
open a text document and paste
in the networks broadcast
name (essid), its mac address
(bssid) and its channel number.
To get the above information,
use the arrow keys to select an
access point and hit to
get more information about it.
5. The next step is to start
collecting data from the access
point with airodump. Open up a
new terminal and start
airodump by typing in the
command
br />
airodump-ng -c [channel#] -w
[filename] –bssid [bssid]
[device]
In the above command
airodump-ng starts the
program , the channel of your
access point goes after -c , the
file you wish to output the data
goes after -w , and the MAC
address of the access point goes
after –bssid. The command ends
with the device name. Make sure
to leave out the brackets.
6. Leave the above running and
open another terminal. Next we
will generate some fake packets
to the target access point so that
the speed of the data output will
increase. Put in the following
command
br />
aireplay-ng -1 0 -a [bssid] -h
00:11:22:33:44:55:66 -e [essid]
[device]
In the above command we are
using the airplay-ng program.
The -1 tells the program the
specific attack we wish to use
which in this case is fake
authentication with the access
point. The 0 cites the delay
between attacks, -a is the MAC
address of the target access
point, -h is your wireless
adapters MAC address, -e is the
name (essid) of the target
access point, and the command
ends with the your wireless
adapters device name.
7. Now, we will force the target
access point to send out a huge
amount of packets that we will
be able to take advantage of by
using them to attempt to crack
the WEP key. Once the following
command is executed, check
your airodump-ng terminal and
you should see the ARP packet
count to start to increase. The
command is
br />
aireplay
3 -b [bssid] -h
00:11:22:33:44:5:66 [device]
In this command, the -3 tells the
program the specific type of
attack which in this case is
packet injection, -b is the MAC
address of the target access
point , -h is your wireless
adapters MAC address, and the
wireless adapter device name
goes at the end.
8. Once you have collected
around 50k-500k packets, you
may begin the attempt to break
the WEP key. The command to
begin the cracking process is
br />
aircrack-ng -a 1 -b [bssid] -n 128
[filename].ivs
In thiscommand the -a 1 forces
the program into the WEP attack
mode, the -b is the targets MAC
address, and the -n 128 tells the
program the WEP key length. If
you don’t know the -n , then
leave it out. This should crack the
WEP key within seconds. The
more packets you capture, the
bigger chance you have of
cracking the WEP key. - See more at: http://solutionz.wapka.mobi/forum2_theme_111095968.xhtml?tema=20#sthash.aHSiwP6t.dpuf
So.. Here’s how we do it..
1) First we need to scan for
available wireless networks.
Theres this great tool for
windows to do this.. called
“NetStumbler” or Kismet for
Windows and Linux and KisMac
for Mac
It’ll also show how the Wi-fi
network is secured..
The two most common
encryption types are

2. WAP
WEP i.e Wire Equivalent Privacy
is not consideres as safe as WAP
i.e Wireless Application
Protocol.
WEPhave many flaws that
allows a hacker to crack a WEP
key easily.. whereas
WAPis currently the most
secure and best option to
secure a wi-fi network..
It can’t be easily cracked as WEP
because the only way to retreive
a WAP key is to use a brute-force
attack or dictionary atack.
Here I’ll tell you how to Crack
WEP
To crack WEP we will be using
Live Linux distribution called
BackTrack to crack WEP.
BackTrack have lots of
preinstalled softwares for this
very purpose..
Thetools we will be using on
Backtrack are

detector
airodump – captures packets
from a wireless router
aireplay – forges ARP requests
aircrack – decrypts the WEP keys
1. First of all we have to find a
wireless access point along with
its bssid, essid and channel
number. To do this we will run
kismet by opening up the
terminal and typing in kismet. It
may ask you for the appropriate
adapter which in my case is
ath0. You can see your device’s
name by typing in the command
iwconfig.
2.To be able to do some of the
later things, your wireless
adapter must be put into
monitor mode. Kismet
automatically does this and as
long as you keep it open, your
wireless adapter will stay in
monitor mode.
3. In kismet you will see the flags
Y/N/0. Each one stands for a
different type of encryption. In
our case we will be looking for
access points with the WEP
encryption. Y=WEP N=OPEN
0=OTHER(usually WAP).
4.Once you find an access point,
open a text document and paste
in the networks broadcast
name (essid), its mac address
(bssid) and its channel number.
To get the above information,
use the arrow keys to select an
access point and hit
get more information about it.
5. The next step is to start
collecting data from the access
point with airodump. Open up a
new terminal and start
airodump by typing in the
command

[filename] –bssid [bssid]
[device]
In the above command
airodump-ng starts the
program , the channel of your
access point goes after -c , the
file you wish to output the data
goes after -w , and the MAC
address of the access point goes
after –bssid. The command ends
with the device name. Make sure
to leave out the brackets.
6. Leave the above running and
open another terminal. Next we
will generate some fake packets
to the target access point so that
the speed of the data output will
increase. Put in the following
command

00:11:22:33:44:55:66 -e [essid]
[device]
In the above command we are
using the airplay-ng program.
The -1 tells the program the
specific attack we wish to use
which in this case is fake
authentication with the access
point. The 0 cites the delay
between attacks, -a is the MAC
address of the target access
point, -h is your wireless
adapters MAC address, -e is the
name (essid) of the target
access point, and the command
ends with the your wireless
adapters device name.
7. Now, we will force the target
access point to send out a huge
amount of packets that we will
be able to take advantage of by
using them to attempt to crack
the WEP key. Once the following
command is executed, check
your airodump-ng terminal and
you should see the ARP packet
count to start to increase. The
command is


00:11:22:33:44:5:66 [device]
In this command, the -3 tells the
program the specific type of
attack which in this case is
packet injection, -b is the MAC
address of the target access
point , -h is your wireless
adapters MAC address, and the
wireless adapter device name
goes at the end.
8. Once you have collected
around 50k-500k packets, you
may begin the attempt to break
the WEP key. The command to
begin the cracking process is

[filename].ivs
In thiscommand the -a 1 forces
the program into the WEP attack
mode, the -b is the targets MAC
address, and the -n 128 tells the
program the WEP key length. If
you don’t know the -n , then
leave it out. This should crack the
WEP key within seconds. The
more packets you capture, the
bigger chance you have of
cracking the WEP key. - See more at: http://solutionz.wapka.mobi/forum2_theme_111095968.xhtml?tema=20#sthash.aHSiwP6t.dpuf
Let's Begin
So.. Here’s how we do it..
1) First we need to scan for
available wireless networks.
Theres this great tool for
windows to do this.. called
“NetStumbler” or Kismet for
Windows and Linux and KisMac
for Mac
It’ll also show how the Wi-fi
network is secured..
The two most common
encryption types are
br />
1. WEP
2. WAP
WEP i.e Wire Equivalent Privacy
is not consideres as safe as WAP
i.e Wireless Application
Protocol.
WEPhave many flaws that
allows a hacker to crack a WEP
key easily.. whereas
WAPis currently the most
secure and best option to
secure a wi-fi network..
It can’t be easily cracked as WEP
because the only way to retreive
a WAP key is to use a brute-force
attack or dictionary atack.
Here I’ll tell you how to Crack
WEP
To crack WEP we will be using
Live Linux distribution called
BackTrack to crack WEP.
BackTrack have lots of
preinstalled softwares for this
very purpose..
Thetools we will be using on
Backtrack are
br />
Kismet – a wireless network
detector
airodump – captures packets
from a wireless router
aireplay – forges ARP requests
aircrack – decrypts the WEP keys
1. First of all we have to find a
wireless access point along with
its bssid, essid and channel
number. To do this we will run
kismet by opening up the
terminal and typing in kismet. It
may ask you for the appropriate
adapter which in my case is
ath0. You can see your device’s
name by typing in the command
iwconfig.
2.To be able to do some of the
later things, your wireless
adapter must be put into
monitor mode. Kismet
automatically does this and as
long as you keep it open, your
wireless adapter will stay in
monitor mode.
3. In kismet you will see the flags
Y/N/0. Each one stands for a
different type of encryption. In
our case we will be looking for
access points with the WEP
encryption. Y=WEP N=OPEN
0=OTHER(usually WAP).
4.Once you find an access point,
open a text document and paste
in the networks broadcast
name (essid), its mac address
(bssid) and its channel number.
To get the above information,
use the arrow keys to select an
access point and hit to
get more information about it.
5. The next step is to start
collecting data from the access
point with airodump. Open up a
new terminal and start
airodump by typing in the
command
br />
airodump-ng -c [channel#] -w
[filename] –bssid [bssid]
[device]
In the above command
airodump-ng starts the
program , the channel of your
access point goes after -c , the
file you wish to output the data
goes after -w , and the MAC
address of the access point goes
after –bssid. The command ends
with the device name. Make sure
to leave out the brackets.
6. Leave the above running and
open another terminal. Next we
will generate some fake packets
to the target access point so that
the speed of the data output will
increase. Put in the following
command
br />
aireplay-ng -1 0 -a [bssid] -h
00:11:22:33:44:55:66 -e [essid]
[device]
In the above command we are
using the airplay-ng program.
The -1 tells the program the
specific attack we wish to use
which in this case is fake
authentication with the access
point. The 0 cites the delay
between attacks, -a is the MAC
address of the target access
point, -h is your wireless
adapters MAC address, -e is the
name (essid) of the target
access point, and the command
ends with the your wireless
adapters device name.
7. Now, we will force the target
access point to send out a huge
amount of packets that we will
be able to take advantage of by
using them to attempt to crack
the WEP key. Once the following
command is executed, check
your airodump-ng terminal and
you should see the ARP packet
count to start to increase. The
command is
br />
aireplay
3 -b [bssid] -h
00:11:22:33:44:5:66 [device]
In this command, the -3 tells the
program the specific type of
attack which in this case is
packet injection, -b is the MAC
address of the target access
point , -h is your wireless
adapters MAC address, and the
wireless adapter device name
goes at the end.
8. Once you have collected
around 50k-500k packets, you
may begin the attempt to break
the WEP key. The command to
begin the cracking process is
br />
aircrack-ng -a 1 -b [bssid] -n 128
[filename].ivs
In thiscommand the -a 1 forces
the program into the WEP attack
mode, the -b is the targets MAC
address, and the -n 128 tells the
program the WEP key length. If
you don’t know the -n , then
leave it out. This should crack the
WEP key within seconds. The
more packets you capture, the
bigger chance you have of
cracking the WEP key. - See more at: http://solutionz.wapka.mobi/forum2_theme_111095968.xhtml?tema=20#sthash.aHSiwP6t.dpuf
So.. Here’s how we do it..
1) First we need to scan for
available wireless networks.
Theres this great tool for
windows to do this.. called
“NetStumbler” or Kismet for
Windows and Linux and KisMac
for Mac
It’ll also show how the Wi-fi
network is secured..
The two most common
encryption types are

2. WAP
WEP i.e Wire Equivalent Privacy
is not consideres as safe as WAP
i.e Wireless Application
Protocol.
WEPhave many flaws that
allows a hacker to crack a WEP
key easily.. whereas
WAPis currently the most
secure and best option to
secure a wi-fi network..
It can’t be easily cracked as WEP
because the only way to retreive
a WAP key is to use a brute-force
attack or dictionary atack.
Here I’ll tell you how to Crack
WEP
To crack WEP we will be using
Live Linux distribution called
BackTrack to crack WEP.
BackTrack have lots of
preinstalled softwares for this
very purpose..
Thetools we will be using on
Backtrack are

detector
airodump – captures packets
from a wireless router
aireplay – forges ARP requests
aircrack – decrypts the WEP keys
1. First of all we have to find a
wireless access point along with
its bssid, essid and channel
number. To do this we will run
kismet by opening up the
terminal and typing in kismet. It
may ask you for the appropriate
adapter which in my case is
ath0. You can see your device’s
name by typing in the command
iwconfig.
2.To be able to do some of the
later things, your wireless
adapter must be put into
monitor mode. Kismet
automatically does this and as
long as you keep it open, your
wireless adapter will stay in
monitor mode.
3. In kismet you will see the flags
Y/N/0. Each one stands for a
different type of encryption. In
our case we will be looking for
access points with the WEP
encryption. Y=WEP N=OPEN
0=OTHER(usually WAP).
4.Once you find an access point,
open a text document and paste
in the networks broadcast
name (essid), its mac address
(bssid) and its channel number.
To get the above information,
use the arrow keys to select an
access point and hit
get more information about it.
5. The next step is to start
collecting data from the access
point with airodump. Open up a
new terminal and start
airodump by typing in the
command

[filename] –bssid [bssid]
[device]
In the above command
airodump-ng starts the
program , the channel of your
access point goes after -c , the
file you wish to output the data
goes after -w , and the MAC
address of the access point goes
after –bssid. The command ends
with the device name. Make sure
to leave out the brackets.
6. Leave the above running and
open another terminal. Next we
will generate some fake packets
to the target access point so that
the speed of the data output will
increase. Put in the following
command

00:11:22:33:44:55:66 -e [essid]
[device]
In the above command we are
using the airplay-ng program.
The -1 tells the program the
specific attack we wish to use
which in this case is fake
authentication with the access
point. The 0 cites the delay
between attacks, -a is the MAC
address of the target access
point, -h is your wireless
adapters MAC address, -e is the
name (essid) of the target
access point, and the command
ends with the your wireless
adapters device name.
7. Now, we will force the target
access point to send out a huge
amount of packets that we will
be able to take advantage of by
using them to attempt to crack
the WEP key. Once the following
command is executed, check
your airodump-ng terminal and
you should see the ARP packet
count to start to increase. The
command is


00:11:22:33:44:5:66 [device]
In this command, the -3 tells the
program the specific type of
attack which in this case is
packet injection, -b is the MAC
address of the target access
point , -h is your wireless
adapters MAC address, and the
wireless adapter device name
goes at the end.
8. Once you have collected
around 50k-500k packets, you
may begin the attempt to break
the WEP key. The command to
begin the cracking process is

[filename].ivs
In thiscommand the -a 1 forces
the program into the WEP attack
mode, the -b is the targets MAC
address, and the -n 128 tells the
program the WEP key length. If
you don’t know the -n , then
leave it out. This should crack the
WEP key within seconds. The
more packets you capture, the
bigger chance you have of
cracking the WEP key. - See more at: http://solutionz.wapka.mobi/forum2_theme_111095968.xhtml?tema=20#sthash.aHSiwP6t.dpuf
he
conduit search toolbar is one application that has proven to be a torn
in the flesh of computer users, your PC may have probably been infected
with this toolbar virus (depending on how you look at it.), the worst is
that it's pretty difficult to get ride of this Conduitsearch engine
from your computer hence the name virus. We're going to see 3 quick and
easy steps to remove this program. - See more at:
http://solutionz.wapka.mobi/forum2_theme_111095968.xhtml?tema=22#sthash.mrYmBLM6.dpu
he
conduit search toolbar is one application that has proven to be a torn
in the flesh of computer users, your PC may have probably been infected
with this toolbar virus (depending on how you look at it.), the worst is
that it's pretty difficult to get ride of this Conduitsearch engine
from your computer hence the name virus. We're going to see 3 quick and
easy steps to remove this program. - See more at:
http://solutionz.wapka.mobi/forum2_theme_111095968.xhtml?tema=22#sthash.mrYmBLM6.dpuf
he
conduit search toolbar is one application that has proven to be a torn
in the flesh of computer users, your PC may have probably been infected
with this toolbar virus (depending on how you look at it.), the worst is
that it's pretty difficult to get ride of this Conduitsearch engine
from your computer hence the name virus. We're going to see 3 quick and
easy steps to remove this program. - See more at:
http://solutionz.wapka.mobi/forum2_theme_111095968.xhtml?tema=22#sthash.mrYmBLM6.dpuf88u8z
he
conduit search toolbar is one application that has proven to be a torn
in the flesh of computer users, your PC may have probably been infected
with this toolbar virus (depending on how you look at it.), the worst is
that it's pretty difficult to get ride of this Conduitsearch engine
from your computer hence the name virus. We're going to see 3 quick and
easy steps to remove this program.
About The Conduit Search Toolbar
The toolbar when viewed in form of virus is an application that's usually embeded in an application, which means it comes in an application you must have installed in your computer via the recommended suggestion. While installing some known applications (apps you know its uses), you might go the quick way and install the app using the "recommended" option, doing this will install everything including this search conduit engine, that is why it's suggested you customize what you install using the "custom" option. Going through customization will help you untick the Conduit Toolbar.
Signs of Conduit Search
1. Slow internet connection, some times you won't even have internet connectivity. This may result in error messages like unable to connect.
2. Your Url will change as Conduit will appear in the web address when you conduct a search.
3. Erratic behaviour of some applications, usually web browsers like Mozilla Firefox, Internet Explorer or Chrome. This clocks the browser's reliability and thus it becomes unstable.
Below are 3 very easy and quick steps to get ride of conduit, eliminating this search engine-like virus for good. It's a do it yourself way which rules out the many programs that seemingly removes this virus (while they don't or worst harden it), this is essentially the easy steps toremove Conduit search engine toolbar without any program. Here are the ways.
1.Uninstall The Conduit via Control PanelThe first step is to remove this virus from the control panel, click start > add or remove program > locate the conduit search or any other recently installed program you don't know its function (fact "conduit may not be its name").
2. Delete From the BrowserAs this creates a toolbar upon installation it's apt you delete it from your browser. ForIEclick the gear icon or Tools at the top, select Internet Options. In the Internet Options dialog box, click on the Advanced tab, then click on the Reset button. Check the Delete personal settings box, then select Reset. After resetting, click Close and OK. Close and open I.E again.
ForMozilla FirefoxClick the Firefox window, head to the Help sub-menu or the Help menu at the top of the Firefox window for windows xp, and select Troubleshooting, click Reset Firefox button in the upper-right corner of the Troubleshooting Information page, and reset it, Firefox will close and be reset. Click finish to finish reseting
Remove from Google Chrome.On the browser toolbar click Chrome menu button on and select Tools > Extensions. In the Extensions tab, remove the Conduit Apps (recycle bin) and any other unknown extensions by clicking the trash icon. Next is to change Google Chrome default search engine from Conduit Search to Google. On the Chrome menu select Settings > Manage search engines, select Google and select > Make Default button that appears. Look for Conduit Search in the Search Engines list, and click the X button that appears. (at row's end) Change Google Chrome homepage from search.conduit.com to its original (default).
3. Uninstall EverythingThis is the surest and perhaps meanest way of deleting or removing conduit engine for good. Go to the control panel again and uninstall all applications one by leaving non-internet applications, and built in app (application that comes with your Operating System) alone. Use the first step to do this.
Ok you're done this are the 3 easy quick steps, for those who are tired those long and tedious process. - See more at: http://solutionz.wapka.mobi/forum2_theme_111095968.xhtml?tema=22#sthash.mrYmBLM6.dpuf
About The Conduit Search Toolbar
The toolbar when viewed in form of virus is an application that's usually embeded in an application, which means it comes in an application you must have installed in your computer via the recommended suggestion. While installing some known applications (apps you know its uses), you might go the quick way and install the app using the "recommended" option, doing this will install everything including this search conduit engine, that is why it's suggested you customize what you install using the "custom" option. Going through customization will help you untick the Conduit Toolbar.
Signs of Conduit Search
1. Slow internet connection, some times you won't even have internet connectivity. This may result in error messages like unable to connect.
2. Your Url will change as Conduit will appear in the web address when you conduct a search.
3. Erratic behaviour of some applications, usually web browsers like Mozilla Firefox, Internet Explorer or Chrome. This clocks the browser's reliability and thus it becomes unstable.
Below are 3 very easy and quick steps to get ride of conduit, eliminating this search engine-like virus for good. It's a do it yourself way which rules out the many programs that seemingly removes this virus (while they don't or worst harden it), this is essentially the easy steps toremove Conduit search engine toolbar without any program. Here are the ways.
1.Uninstall The Conduit via Control PanelThe first step is to remove this virus from the control panel, click start > add or remove program > locate the conduit search or any other recently installed program you don't know its function (fact "conduit may not be its name").
2. Delete From the BrowserAs this creates a toolbar upon installation it's apt you delete it from your browser. ForIEclick the gear icon or Tools at the top, select Internet Options. In the Internet Options dialog box, click on the Advanced tab, then click on the Reset button. Check the Delete personal settings box, then select Reset. After resetting, click Close and OK. Close and open I.E again.
ForMozilla FirefoxClick the Firefox window, head to the Help sub-menu or the Help menu at the top of the Firefox window for windows xp, and select Troubleshooting, click Reset Firefox button in the upper-right corner of the Troubleshooting Information page, and reset it, Firefox will close and be reset. Click finish to finish reseting
Remove from Google Chrome.On the browser toolbar click Chrome menu button on and select Tools > Extensions. In the Extensions tab, remove the Conduit Apps (recycle bin) and any other unknown extensions by clicking the trash icon. Next is to change Google Chrome default search engine from Conduit Search to Google. On the Chrome menu select Settings > Manage search engines, select Google and select > Make Default button that appears. Look for Conduit Search in the Search Engines list, and click the X button that appears. (at row's end) Change Google Chrome homepage from search.conduit.com to its original (default).
3. Uninstall EverythingThis is the surest and perhaps meanest way of deleting or removing conduit engine for good. Go to the control panel again and uninstall all applications one by leaving non-internet applications, and built in app (application that comes with your Operating System) alone. Use the first step to do this.
Ok you're done this are the 3 easy quick steps, for those who are tired those long and tedious process. - See more at: http://solutionz.wapka.mobi/forum2_theme_111095968.xhtml?tema=22#sthash.mrYmBLM6.dpuf
0 comments :
Post a Comment