[kismac] Re: password hash

  • From: themacuser <themacuser@xxxxxxxxx>
  • To: kismac@xxxxxxxxxxxxx
  • Date: Thu, 1 Jun 2006 10:45:52 +0930

Yeah. Good explanation.

The problem is that it could match any number of things in the wordlist, and it would be impossible to determine which one it was.

On 01/06/2006, at 12:16 AM, Johnny Cache wrote:

The reason you can't get back to the plaintext is because
the neesus datacom 'hashing' aglorithm (i don't like to even give it the
status of a hash) algorithm is really, really bad.

There is a many to one mapping, for example 'cat' and 'catt' make
the same 40 bit wep key. You could hash a dictionary file and hope to
find the original, but it wouldn't get you any farther unless they
use the same password elsewhere.


On Wed, 31 May 2006, Patrick Cudahy wrote:

I'm not sure what the plaintext / hex relationship is in WEP, but it
was a WEP secured router that I cracked with Newsham's and KisMAC
spit out 5 hex values. I went to connect with airport and put in
those values and it let me in. I was just wondering if there was
anyway to get from those hex digits to what the "real" password is.
-Patrick Cudahy

On May 30, 2006, at 11:40 PM, themacuser wrote:

Or the network key could have just been a hex key? Or it was hashed
down from an ASCII value?

Anyway, you can just type the hex into the password field of the
airport join screen with 0x in front of it

On 31/05/2006, at 9:39 AM, J.T. Thompson wrote:

what did you exactly crack? a wep password? chances are thats the password to the network you cracked.. is it like 10 letters long? wep passwords are normaly 10char long..

Other related posts: