Good luck with 127.0.0.1, I've heard it can be difficult to both attack that box and defend your own at the same time!
I've compiled the sources earlier this morning into deb packages for those that want to play with it without building from source (building from source will confuse the system and you might not get updates). Both i386 and amd64 versions working on BT5 r2 here. http://www.phillips321.co.uk/2012/05/22/creating-a-debian-package-from-source-checkinstall/
"maybe six hours of work if you really stretched things".....
But from the looks of things this guy is a douchbag, if he is dumb enough to get caught i also guess he was dumb enough to use a replay attack in order to gather enough IVs. I guess he was also dump enough to connect to the network with his hardware MAC address rather than a cloned address from the target network. I guess his hostname was also something dumb like "BarrysLaptop".
For those out there wishing to do this take precaution!
- Use bootable usb stick for all hacking (and quickly swallow if feds show up)
- When sniffing for WEP IVs or WPA handshake do so without inbjectng traffic
- Change mac address to one that target network is already using
- Change hostname to match targets machine
- If using backtrack then ensure HTTP get requests match that of the targets machine: if target use Internet explorer and all your requests come from Firefox on a linux host it's pretty obvious is was spoofed.
- ALL IN ALL DONT DO IT! If you have a problem with the neighbour just speak to him like a normal human being over a cold can of beer
WPA on the otherhand can be performed offline once the 4 way handshake as been captured.... (Which can be optained by waiting for a valid client to connect or by de-authing the clients and then capturing the handshake once they reconnect)
If this is your boss then surely blackmail is the way forward! (unless he's a cool boss = congratulate him and join him next time)
** You're = your
MultiUSER is when you require more than one user
MultiTASK is when you wish to carry out more than one process.
More cpu cycles consumed.
More memory consumed
If a remote code execution vulnerability is released for that version of telnet then wham....
I'm a pentester and the lead maintainer of a pentest Linux distro based on gnome: gnacktrack.co.uk........
Yet i also train in MMA daily and although what the Americans would term as a Rookie, i am yet to loose at the standard i'm fighting. I would say i'm both a geek and cool.