Yeah. Good explanation.
On 01/06/2006, at 12:16 AM, Johnny Cache wrote:
The reason you can't get back to the plaintext is because
the neesus datacom 'hashing' aglorithm (i don't like to even give it the
status of a hash) algorithm is really, really bad.
There is a many to one mapping, for example 'cat' and 'catt' make the same 40 bit wep key. You could hash a dictionary file and hope to find the original, but it wouldn't get you any farther unless they use the same password elsewhere.
-jc
On Wed, 31 May 2006, Patrick Cudahy wrote:
I'm not sure what the plaintext / hex relationship is in WEP, but it was a WEP secured router that I cracked with Newsham's and KisMAC spit out 5 hex values. I went to connect with airport and put in those values and it let me in. I was just wondering if there was anyway to get from those hex digits to what the "real" password is. -Patrick Cudahy
On May 30, 2006, at 11:40 PM, themacuser wrote:
Or the network key could have just been a hex key? Or it was hashed down from an ASCII value?
Anyway, you can just type the hex into the password field of the airport join screen with 0x in front of it 0x1234567890
On 31/05/2006, at 9:39 AM, J.T. Thompson wrote:
what did you exactly crack? a wep password? chances are thats the password to the network you cracked.. is it like 10 letters long? wep passwords are normaly 10char long..