[kismac] Re: Never enough packets

  • From: Lasse Jespersen <l.j@xxxxx>
  • To: kismac@xxxxxxxxxxxxx
  • Date: Sun, 26 Sep 2004 18:14:20 +0200

afair, the fms attack requires between 500,000 and 2,000,000 data packets and sometimes works. the aircrack should be more effective, but i havent had time to test aircrack yet.
On Sep 21, 2004, at 5:44 PM, Natalia Portillo wrote:


Well, just my airport extreme base station seems to have no weak packets
when there are no clients.


I think that to crack one there must be a lot of traffic, not?
In one hour it generated only 5000 packets.

-----Mensaje original-----
De: kismac-bounce@xxxxxxxxxxxxx
[mailto:kismac-bounce@xxxxxxxxxxxxx] En nombre de Johnny Cache
Enviado el: martes, 21 de septiembre de 2004 16:29
Para: kismac@xxxxxxxxxxxxx
Asunto: [kismac] Re: Never enough packets

I havent tried it yet, but i have been developing my own
cross platform distributed wep cracker. Its been
cross-developed on ppc/osx and linux/x86 from the start so it
plays nice everywhere. Its just a bruteforcer so its good
when theres not a lot of data to crack. It was designed to
run on a cluster but it works just as well as any other
bruteforcer would on your own box. Screenshot at
http://www.hick.org/~johnycsh/images/jc-wepcrack-104bit.jpg
code:
http://www.hick.org/~johnycsh/jc-wepcrack-0.9.6.7.tar.gz
I havent released it yet so theres not much in the way of docs.
This isnt suited for those of you afraid of the command line -jc


On Tue, 21 Sep 2004, Lasse Jespersen wrote:

read: [ anyone, besides Erik ]
On Sep 21, 2004, at 8:48 AM, Lasse Jespersen wrote:

It compiles nicely, thanks for bringing this to my
attention.. Has
anyone tried this with kismac's pcap dumps yet?

On Sep 20, 2004, at 7:19 PM, Erik Winkler wrote:

Cracking via weak packets is broken on the current
version of Kismac.
 If you save your Kismac dump files you can use a tool like
aircrack
(http://www.cr0.net:8040/code/network/)  to crack the
WEP key for a
specific BSSID. While the aircrack toolset was designed
for Linux,
the aircrack and 802ether applications compile and work
under MacOS
X just fine.

In my tests I was able to crack a 128-bit WEP key after
capturing
about 500,000 encrypted packets. Notice I didn't say
weak packets
as aircrack doesn't depend on "weak" packets, only packets with
unique IVs.

I've posted version 2.0 of Aircrack compiled for MacOSX at
http://www.macunix.net/Aircrack-2.0_MacOSX.zip

Please see the readme file on how to use aircrack.

Erik

On Sep 20, 2004, at 12:05 PM, Francis Gulotta wrote:

That's a hard one. Anywhere from 10 to 10,000 depending on how
weak the weak packets are, and if the same weakness is
through out them.
Even after a day or two monitoring my own network (which is
heavily
used) I still was unable to crack my wep. I had something like
15,000 weak packets.

-Francis

On Sep 20, 2004, at 11:40 AM, Natalia Portillo wrote:

Why everytime I try any crack method (bruteforce or
others), it
says that there are not enough packets?

What is the minimum packets?







--
During times of universal deceit, telling the truth becomes a
revolutionary act.
--  George Orwell



--
During times of universal deceit, telling the truth becomes a
revolutionary act.
--  George Orwell






--
During times of universal deceit, telling the truth becomes a revolutionary act.
-- George Orwell



Other related posts: