[kismac] Re: what is required to crack WPA?

  • From: "Javier Bonet" <jabonet@xxxxxxxxxx>
  • To: kismac@xxxxxxxxxxxxx
  • Date: Thu, 16 Aug 2007 15:55:14 +0200 (CEST)

How long could Jacktheripper take to crack WPA?

Is it possible to capture a handshake, how many handshake could you need?

J

----- Start Original Message -----
Sent: Tue, 14 Aug 2007 20:23:15 -0400
From: adese <adese0@xxxxxxxxx>
To: kismac@xxxxxxxxxxxxx
Subject: [kismac] Re: what is required to crack WPA?

> A "handshake" is needed to be captured in order to crack WPA. A  
> handshake occurs when a client connects to an access point for the  
> first time. i.e. when they turn their computer on and the computer  
> autoconnects to the network a handshake packet occurs.
> 
> There are only 2 ways to crack this, either by a dictionary attack  
> using :
> 
> aircrack-ng -a 2 -w dictionaryfile capturefile
> 
> Or by brute force which requires an app like JohnTheRipper.
> 
> For these reasons, WPA is very secure given one uses a non-dictionary  
> password.
> 
> -adese
> 
> 
> 
> 
> On 14 aug 2007, at 19.59, Javier Bonet wrote:
> 
> > What is required to crack WPA WLANs?
> >
> > what does the --WPA comands in aircrack-ng.
> >
> > J
> >
> 
> 
> 

----- End Original Message -----

Other related posts: