[kismac] Re: A beginners question

  • From: Michael Rossberg <mick@xxxxxxxxxxxxxxxx>
  • To: kismac@xxxxxxxxxxxxx
  • Date: Tue, 2 Sep 2003 01:44:44 +0200

> I got the cracking to work after I went from 5d4 back to the stable
> release (5b).  Although when I chose the brute force attack that tries
> all characters, I get the "cracking" progress indicator.  But it never
> moves forward.  Maybe I am impatient.  I imagine this takes a LONG time
> to do.  The mathematics involved kind of boggle the mind.  So I am just
> going to let it sit.  Perhaps overnight.

A bruteforce against all characters can take weeks!!!

> I know for a fact that the access point I am attempting to crack is 128
> bit.  And these brute force attacks are only 40-bit.  Is there support
> planned for a 128/104/100 brute force attack?  I am thinking that the
> time it would take to complete would be extreme.  And maybe this is why
> the option doesn't exist.

correct. However the new versions of KisMAC offer wordlist attacks, 
which are a very powerful tool.

> Mick, this is a wonderful tool.  I have had some great fun with my Mac.
>   Netstumbler pales in comparison.  ;-)

thanks ;-)


>> it is much easier. just select the network you want to crack and 
>> choose
>> the right attack. pcap dumps are only for export into other programs
>> such as ethereal.
>> please note that there is a bug in current kismac implementations,
>> which can prevent the working window from disappearing, if the 
>> cracking
>> process is too fast (yes it is weired).
>> mick

Other related posts: