[kismac] Re: Never enough packets

  • From: Johnny Cache <johnycsh@xxxxxxxx>
  • To: kismac@xxxxxxxxxxxxx
  • Date: Tue, 21 Sep 2004 11:05:24 -0500 (CDT)

Definetly not under vanilla windows.
If you have a working cygwin install id give it a
95% chance of working. Maybe a little tweaking, maybe not though.
-jc


On Tue, 21 Sep 2004, Natalia Portillo wrote:

> Forgot to ask, you think that this will compile under Win32?
> My fastest machine is a Win32 one.
>
> > -----Mensaje original-----
> > De: kismac-bounce@xxxxxxxxxxxxx
> > [mailto:kismac-bounce@xxxxxxxxxxxxx] En nombre de Johnny Cache
> > Enviado el: martes, 21 de septiembre de 2004 16:29
> > Para: kismac@xxxxxxxxxxxxx
> > Asunto: [kismac] Re: Never enough packets
> >
> > I havent tried it yet, but i have been developing my own
> > cross platform distributed wep cracker. Its been
> > cross-developed on ppc/osx and linux/x86 from the start so it
> > plays nice everywhere. Its just a bruteforcer so its good
> > when theres not a lot of data to crack. It was designed to
> > run on a cluster but it works just as well as any other
> > bruteforcer would on your own box. Screenshot at
> > http://www.hick.org/~johnycsh/images/jc-wepcrack-104bit.jpg
> > code:
> > http://www.hick.org/~johnycsh/jc-wepcrack-0.9.6.7.tar.gz
> > I havent released it yet so theres not much in the way of docs.
> > This isnt suited for those of you afraid of the command line -jc
> >
> >
> > On Tue, 21 Sep 2004, Lasse Jespersen wrote:
> >
> > > read: [ anyone, besides Erik ]
> > > On Sep 21, 2004, at 8:48 AM, Lasse Jespersen wrote:
> > >
> > > > It compiles nicely, thanks for bringing this to my
> > attention.. Has
> > > > anyone tried this with kismac's pcap dumps yet?
> > > >
> > > > On Sep 20, 2004, at 7:19 PM, Erik Winkler wrote:
> > > >
> > > >> Cracking via weak packets is broken on the current
> > version of Kismac.
> > > >>  If you save your Kismac dump files you can use a tool like
> > > >> aircrack
> > > >> (http://www.cr0.net:8040/code/network/)  to crack the
> > WEP key for a
> > > >> specific BSSID.  While the aircrack toolset was designed
> > for Linux,
> > > >> the aircrack and 802ether applications compile and work
> > under MacOS
> > > >> X just fine.
> > > >>
> > > >> In my tests I was able to crack a 128-bit WEP key after
> > capturing
> > > >> about 500,000 encrypted packets.  Notice I didn't say
> > weak packets
> > > >> as aircrack doesn't depend on "weak" packets, only packets with
> > > >> unique IVs.
> > > >>
> > > >> I've posted version 2.0 of Aircrack compiled for MacOSX at
> > > >> http://www.macunix.net/Aircrack-2.0_MacOSX.zip
> > > >>
> > > >> Please see the readme file on how to use aircrack.
> > > >>
> > > >> Erik
> > > >>
> > > >> On Sep 20, 2004, at 12:05 PM, Francis Gulotta wrote:
> > > >>
> > > >>> That's a hard one. Anywhere from 10 to 10,000 depending on how
> > > >>> weak the weak packets are, and if the same weakness is
> > through out them.
> > > >>> Even after a day or two monitoring my own network (which is
> > > >>> heavily
> > > >>> used) I still was unable to crack my wep. I had something like
> > > >>> 15,000 weak packets.
> > > >>>
> > > >>> -Francis
> > > >>>
> > > >>> On Sep 20, 2004, at 11:40 AM, Natalia Portillo wrote:
> > > >>>
> > > >>>> Why everytime I try any crack method (bruteforce or
> > others), it
> > > >>>> says that there are not enough packets?
> > > >>>>
> > > >>>> What is the minimum packets?
> > > >>>>
> > > >>>>
> > > >>>
> > > >>>
> > > >>
> > > >>
> > > >>
> > > > --
> > > > During times of universal deceit, telling the truth becomes a
> > > > revolutionary act.
> > > > --  George Orwell
> > > >
> > > >
> > > >
> > > --
> > > During times of universal deceit, telling the truth becomes a
> > > revolutionary act.
> > > --  George Orwell
> > >
> > >
> >
>
>

Other related posts: