this post was submitted on 17 Jun 2025
76 points (100.0% liked)
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ
62053 readers
467 users here now
⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.
Rules • Full Version
1. Posts must be related to the discussion of digital piracy
2. Don't request invites, trade, sell, or self-promote
3. Don't request or link to specific pirated titles, including DMs
4. Don't submit low-quality posts, be entitled, or harass others
Loot, Pillage, & Plunder
📜 c/Piracy Wiki (Community Edition):
🏴☠️ Other communities
FUCK ADOBE!
Torrenting/P2P:
Gaming:
💰 Please help cover server costs.
![]() |
![]() |
---|---|
Ko-fi | Liberapay |
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
So, this was more common when WEP encryption was used. You could just listen to the radio traffic of the given network and collect IVs which the encryption would leak. Once you had enough pieces you could reassemble the key and access the network. When WPA came out it was harder, but tools like pyrit and john the ripper helped, so long as you were able to capture the 4-way TCP handshake.
To actually see the networks, you would build biquad parabolic antennas from old DirecTV dishes people left behind. They were very directional high gain antennas that you would just target at someone's house. We'd also build cantennas from junk laying around. Those were interesting days.
lol I did that for a while when I was broke... for quite some time I rigged up my linksys router with wrt, set it up as a repeater for my neighbors wifi after cracking it.
Of course the real irony was after cracking it, I realized I could have cracked it much easier with a phone book (after realizing my local ISP, just used the persons phone number as the WEP key)