[kismac] Re: WPA Data Packets

  • From: Erik Winkler <ewinkler@xxxxxxxxx>
  • To: kismac@xxxxxxxxxxxxx
  • Date: Wed, 14 Jun 2006 15:33:25 -0400

No, because a strong passphrase was chosen I was not able to recover the WPA key. This is actually the kind of finding I like to get during a wireless assessment.

On Jun 14, 2006, at 2:07 PM, Daren wrote:

So once you were able to get that was a dictionary attack successful?

I have collected over 1500 data packets yet kismac still says I need more?

Daren

On Jun 14, 2006, at 5:50 AM, Erik Winkler wrote:

For WPA dictionary attacks, you need to capture the authentication handshake between a valid client and the access point. I have done this for wireless assessments by sending a deauthentication packet targeted to the specific client BSSID. Once the client disconnects and reconnects to the AP, you have your WPA handshake.

Erik

On Jun 14, 2006, at 12:59 AM, Daren wrote:

So what is the min # of data packets before you can start a bruteforce wordlist attack?


Thanks
Daren
PS has anyone successfully been able to break a wpa with a wordlist attack....using Kismac that is.






Other related posts: