[kismac] Re: Never enough packets

  • From: "Natalia Portillo" <iosglpgc@xxxxxxxxxxx>
  • To: <kismac@xxxxxxxxxxxxx>
  • Date: Tue, 21 Sep 2004 16:44:42 +0100

Well, just my airport extreme base station seems to have no weak packets
when there are no clients.

I think that to crack one there must be a lot of traffic, not?
In one hour it generated only 5000 packets. 

> -----Mensaje original-----
> De: kismac-bounce@xxxxxxxxxxxxx 
> [mailto:kismac-bounce@xxxxxxxxxxxxx] En nombre de Johnny Cache
> Enviado el: martes, 21 de septiembre de 2004 16:29
> Para: kismac@xxxxxxxxxxxxx
> Asunto: [kismac] Re: Never enough packets
> 
> I havent tried it yet, but i have been developing my own 
> cross platform distributed wep cracker. Its been 
> cross-developed on ppc/osx and linux/x86 from the start so it 
> plays nice everywhere. Its just a bruteforcer so its good  
> when theres not a lot of data to crack. It was designed to 
> run on a cluster but it works just as well as any other 
> bruteforcer would on your own box. Screenshot at 
> http://www.hick.org/~johnycsh/images/jc-wepcrack-104bit.jpg
> code:
> http://www.hick.org/~johnycsh/jc-wepcrack-0.9.6.7.tar.gz
> I havent released it yet so theres not much in the way of docs.
> This isnt suited for those of you afraid of the command line -jc
> 
> 
> On Tue, 21 Sep 2004, Lasse Jespersen wrote:
> 
> > read: [ anyone, besides Erik ]
> > On Sep 21, 2004, at 8:48 AM, Lasse Jespersen wrote:
> >
> > > It compiles nicely, thanks for bringing this to my 
> attention.. Has 
> > > anyone tried this with kismac's pcap dumps yet?
> > >
> > > On Sep 20, 2004, at 7:19 PM, Erik Winkler wrote:
> > >
> > >> Cracking via weak packets is broken on the current 
> version of Kismac.
> > >>  If you save your Kismac dump files you can use a tool like 
> > >> aircrack
> > >> (http://www.cr0.net:8040/code/network/)  to crack the 
> WEP key for a 
> > >> specific BSSID.  While the aircrack toolset was designed 
> for Linux, 
> > >> the aircrack and 802ether applications compile and work 
> under MacOS 
> > >> X just fine.
> > >>
> > >> In my tests I was able to crack a 128-bit WEP key after 
> capturing 
> > >> about 500,000 encrypted packets.  Notice I didn't say 
> weak packets 
> > >> as aircrack doesn't depend on "weak" packets, only packets with 
> > >> unique IVs.
> > >>
> > >> I've posted version 2.0 of Aircrack compiled for MacOSX at 
> > >> http://www.macunix.net/Aircrack-2.0_MacOSX.zip
> > >>
> > >> Please see the readme file on how to use aircrack.
> > >>
> > >> Erik
> > >>
> > >> On Sep 20, 2004, at 12:05 PM, Francis Gulotta wrote:
> > >>
> > >>> That's a hard one. Anywhere from 10 to 10,000 depending on how 
> > >>> weak the weak packets are, and if the same weakness is 
> through out them.
> > >>> Even after a day or two monitoring my own network (which is 
> > >>> heavily
> > >>> used) I still was unable to crack my wep. I had something like 
> > >>> 15,000 weak packets.
> > >>>
> > >>> -Francis
> > >>>
> > >>> On Sep 20, 2004, at 11:40 AM, Natalia Portillo wrote:
> > >>>
> > >>>> Why everytime I try any crack method (bruteforce or 
> others), it 
> > >>>> says that there are not enough packets?
> > >>>>
> > >>>> What is the minimum packets?
> > >>>>
> > >>>>
> > >>>
> > >>>
> > >>
> > >>
> > >>
> > > --
> > > During times of universal deceit, telling the truth becomes a 
> > > revolutionary act.
> > > --  George Orwell
> > >
> > >
> > >
> > --
> > During times of universal deceit, telling the truth becomes a 
> > revolutionary act.
> > --  George Orwell
> >
> >
> 


Other related posts: