The reason you can't get back to the plaintext is because the neesus datacom 'hashing' aglorithm (i don't like to even give it the status of a hash) algorithm is really, really bad. There is a many to one mapping, for example 'cat' and 'catt' make the same 40 bit wep key. You could hash a dictionary file and hope to find the original, but it wouldn't get you any farther unless they use the same password elsewhere. -jc On Wed, 31 May 2006, Patrick Cudahy wrote: > I'm not sure what the plaintext / hex relationship is in WEP, but it > was a WEP secured router that I cracked with Newsham's and KisMAC > spit out 5 hex values. I went to connect with airport and put in > those values and it let me in. I was just wondering if there was > anyway to get from those hex digits to what the "real" password is. > -Patrick Cudahy > > On May 30, 2006, at 11:40 PM, themacuser wrote: > > > Or the network key could have just been a hex key? Or it was hashed > > down from an ASCII value? > > > > Anyway, you can just type the hex into the password field of the > > airport join screen with 0x in front of it > > 0x1234567890 > > > > On 31/05/2006, at 9:39 AM, J.T. Thompson wrote: > > > >> > >> what did you exactly crack? a wep password? chances are thats the > >> password to the network you cracked.. is it like 10 letters long? > >> wep passwords are normaly 10char long.. > >> > > > > > >