[kismac] Re: A beginners question

  • From: Ray Haque <ray@xxxxxxxxx>
  • To: kismac@xxxxxxxxxxxxx
  • Date: Mon, 1 Sep 2003 19:37:20 -0400

*This message was transferred with a trial version of CommuniGate(tm) Pro*
I got the cracking to work after I went from 5d4 back to the stable 
release (5b).  Although when I chose the brute force attack that tries 
all characters, I get the "cracking" progress indicator.  But it never 
moves forward.  Maybe I am impatient.  I imagine this takes a LONG time 
to do.  The mathematics involved kind of boggle the mind.  So I am just 
going to let it sit.  Perhaps overnight.

I know for a fact that the access point I am attempting to crack is 128 
bit.  And these brute force attacks are only 40-bit.  Is there support 
planned for a 128/104/100 brute force attack?  I am thinking that the 
time it would take to complete would be extreme.  And maybe this is why 
the option doesn't exist.

Mick, this is a wonderful tool.  I have had some great fun with my Mac. 
  Netstumbler pales in comparison.  ;-)

-Ray Haque

> it is much easier. just select the network you want to crack and choose
> the right attack. pcap dumps are only for export into other programs
> such as ethereal.
> please note that there is a bug in current kismac implementations,
> which can prevent the working window from disappearing, if the cracking
> process is too fast (yes it is weired).
> mick

Other related posts: