[kismac] Re: A beginners question

  • From: Michael Rossberg <mick@xxxxxxxxxxxxxxxx>
  • To: kismac@xxxxxxxxxxxxx
  • Date: Wed, 3 Sep 2003 13:15:34 +0200

> Yeah, it is kind of confusing at first how to go 'bout cracking an AP. 
> What I
> do is in the preference panel have it checked to "Save data packets 
> only" or
> something like that. Since you need a ton of packets you generally 
> can't get
> enough weak packets from one scanning session. When you finish your 
> first
> session just do the regular file->save and name it after your location 
> i.e.
> "home". That'll give you a home.kismac file which you should open when 
> you're
> ready to do a second scan at the same location. After you open it, hit 
> scan,
> and the new results will add on to your saved ones. After many, many 
> nights of
> this (or a few if you're lucky) you'll get 500-1000 weak packets and 
> can then
> go to the crack menu and try a weak scheduling attack. Good luck!

the save data packets only option has nothing to do with the kismac 
files. weak packets are automatically stored in "kismac" files. the 
logging option is just for third party tools. there is no need to do 
anything with it!


>> ===== Original Message From Joe Roth <oundleuk@xxxxxxxxxxx> =====
>> I downloaded and installed KISMAC and wanted to try to crack the wep 
>> key on
>> my own AP and am a bit confused on how to do it. I wanted to prove 
>> the wep
>> vulnerability at work by demonstrating at home.   My wep key is 40 
>> bit.  I
>> assume that I have to turn the dump filter on to some other setting 
>> than No
>> dumping and then run decrypt PCAP dump.  Could someone verify this?  
>> I am
>> running a powerbook g5 with only the one airport card.  I assume I 
>> cant use
>> the crack features with existing setup.  Only the VIHA driver seems 
>> to work.
>> Thanks for tolerating my newbie question.

Other related posts: