[kismac] Re: WPA Data Packets

  • From: Daren <Daren@xxxxxxxxxxxxxxxxxxxxxxxxx>
  • To: kismac@xxxxxxxxxxxxx
  • Date: Wed, 14 Jun 2006 11:07:47 -0700

So once you were able to get that was a dictionary attack successful?

I have collected over 1500 data packets yet kismac still says I need more?

Daren

On Jun 14, 2006, at 5:50 AM, Erik Winkler wrote:

For WPA dictionary attacks, you need to capture the authentication handshake between a valid client and the access point. I have done this for wireless assessments by sending a deauthentication packet targeted to the specific client BSSID. Once the client disconnects and reconnects to the AP, you have your WPA handshake.

Erik

On Jun 14, 2006, at 12:59 AM, Daren wrote:

So what is the min # of data packets before you can start a bruteforce wordlist attack?


Thanks
Daren
PS has anyone successfully been able to break a wpa with a wordlist attack....using Kismac that is.






Other related posts: