afair, the fms attack requires between 500,000 and 2,000,000 data
packets and sometimes works. the aircrack should be more effective, but
i havent had time to test aircrack yet.
On Sep 21, 2004, at 5:44 PM, Natalia Portillo wrote:
Well, just my airport extreme base station seems to have no weak packets--
when there are no clients.
I think that to crack one there must be a lot of traffic, not? In one hour it generated only 5000 packets.
-----Mensaje original----- De: kismac-bounce@xxxxxxxxxxxxx [mailto:kismac-bounce@xxxxxxxxxxxxx] En nombre de Johnny Cache Enviado el: martes, 21 de septiembre de 2004 16:29 Para: kismac@xxxxxxxxxxxxx Asunto: [kismac] Re: Never enough packets
I havent tried it yet, but i have been developing my own cross platform distributed wep cracker. Its been cross-developed on ppc/osx and linux/x86 from the start so it plays nice everywhere. Its just a bruteforcer so its good when theres not a lot of data to crack. It was designed to run on a cluster but it works just as well as any other bruteforcer would on your own box. Screenshot at http://www.hick.org/~johnycsh/images/jc-wepcrack-104bit.jpg code: http://www.hick.org/~johnycsh/jc-wepcrack-0.9.6.7.tar.gz I havent released it yet so theres not much in the way of docs. This isnt suited for those of you afraid of the command line -jc
On Tue, 21 Sep 2004, Lasse Jespersen wrote:
attention.. Hasread: [ anyone, besides Erik ] On Sep 21, 2004, at 8:48 AM, Lasse Jespersen wrote:
It compiles nicely, thanks for bringing this to myversion of Kismac.anyone tried this with kismac's pcap dumps yet?
On Sep 20, 2004, at 7:19 PM, Erik Winkler wrote:
Cracking via weak packets is broken on the currentWEP key for aIf you save your Kismac dump files you can use a tool like aircrack (http://www.cr0.net:8040/code/network/) to crack thefor Linux,specific BSSID. While the aircrack toolset was designedunder MacOSthe aircrack and 802ether applications compile and workcapturingX just fine.
In my tests I was able to crack a 128-bit WEP key afterweak packetsabout 500,000 encrypted packets. Notice I didn't saythrough out them.as aircrack doesn't depend on "weak" packets, only packets with unique IVs.
I've posted version 2.0 of Aircrack compiled for MacOSX at http://www.macunix.net/Aircrack-2.0_MacOSX.zip
Please see the readme file on how to use aircrack.
Erik
On Sep 20, 2004, at 12:05 PM, Francis Gulotta wrote:
That's a hard one. Anywhere from 10 to 10,000 depending on how weak the weak packets are, and if the same weakness isothers), itEven after a day or two monitoring my own network (which is heavily used) I still was unable to crack my wep. I had something like 15,000 weak packets.
-Francis
On Sep 20, 2004, at 11:40 AM, Natalia Portillo wrote:
Why everytime I try any crack method (bruteforce orsays that there are not enough packets?
What is the minimum packets?
-- During times of universal deceit, telling the truth becomes a revolutionary act. -- George Orwell
-- During times of universal deceit, telling the truth becomes a revolutionary act. -- George Orwell