[kismac] Re: Decrypt Output

  • From: Michael Peth <michaelpeth@xxxxxxxxx>
  • To: kismac@xxxxxxxxxxxxx
  • Date: Thu, 06 Oct 2005 14:57:30 +0200

Yea I just installed ethereal via fink, but I didn't see ettercap on fink. I've read ethereal can decrypt the pcap files with the key that kismac found. I'm working on that now. Does it display in text format also?

Alexis Ramel wrote:

Or.. fink !

The same as DarwinPorts, pick the one you want.


Le 6 oct. 05 à 14:38, Ron Rosson a écrit :

You might want to try using darwinports
<http://darwinports.opendarwin.org/>. It tends to make installing unix utils
Ron Rosson

From: Michael Peth <michaelpeth@xxxxxxxxx>
Reply-To: <kismac@xxxxxxxxxxxxx>
Date: Thu, 06 Oct 2005 14:25:15 +0200
To: <kismac@xxxxxxxxxxxxx>
Subject: [kismac] Re: Decrypt Output

I'm having all sort of trouble compiling Ettercap. I've installed the
prereq's it asks for fine. When I run ./configure it configures fine,
but then I get [Error 1: All Recursive]. I'd sooner just find a way to
read the decrypted kismac files than troubleshoot ettercap, I never have
much luck with comiling stuff in darwin. Let me know what you guys
think. Thanks

Erik Winkler wrote:

I recommend you take a look at the ettercap tool (http://
ettercap.sourceforge.net/).  When analyzing wireless packet dumps  you
can issue the command line:

ettercap -T -q --wep-key '128:s:\x11\x22\x33\x44\x55\x79\x69\x73\x71
\x76\x66\x54\x6E' -r kismacdump -m resultsfile.txt

Ettercap will decrypt the packets and show any clear text usernames
and passwords in the decrypted data stream.

On Oct 6, 2005, at 7:00 AM, Michael Peth wrote:

Hey everyone,
I just got kismac up and running last week and have begun sniffing
etc. I am running ibook with airport extreme so I'm not able to
inject or deauthorize, but when I do find a network and sniff it for
a while and then successfully crack the key, I am not able to join
the network. I played around with it for a while and then Saw the
decrypt feature and I load up the dump file in it and then put in
the key it cracked and it says it successfully decrypted with no
packets lost. From there I don't know what to do with the output
file because I dont have anything to open it. Any help would be
greatly appreciated, thanks in advance.

Other related posts: