[kismac] Re: KisMAC 0.11a

  • From: Erik Winkler <ewinkler@xxxxxxxxx>
  • To: kismac@xxxxxxxxxxxxx
  • Date: Thu, 29 Apr 2004 05:34:53 -0400

Mick,

Very nice addition. I'll test the WPA on my Airport Extreme AP and let you know how it works. Now all we need is an attack against Cisco LEAP (such as is currently done in asleap or THC's leapcracker under x86 Linux).

Erik
On Apr 29, 2004, at 4:00 AM, Michael Rossberg wrote:

Hey,

It is time for a new version (again ;). KisMAC now includes a proof-of-concept wordlist attack against WPA. The attack itself will work only for TKIP mode, but it should be easy to modify it for AES mode. KisMAC utilizes Altivec for the attack, but due the well-designed structure of WPA, the attack will not perform very well.
To attack WPA you must observe a complete key exchange of at least one client. One can force such an exchange by doing a short injection of deauthentication packets.
Other new features:


Thanks to Vincent Malguy, KisMAC is now completely localized to French.
Unless the Airport card is occupied in passive mode, one can easily join a network from the network menu now.


I am still looking for translators for German/Spanish/Esperanto ;).

direct link: <http://binaervarianz.de/downloads.php? action=download&mirror=http&file_id=13>

mick


Other related posts: