[kismac] Re: what is required to crack WPA?

  • From: adese <adese0@xxxxxxxxx>
  • To: kismac@xxxxxxxxxxxxx
  • Date: Thu, 16 Aug 2007 10:41:41 -0400

you may find some stuff here
http://irongeek.com/i.php?page=security/vids-by-others

also yeah I havent messed too much with wpa so da_eternal yeah you are very
right about psk and the rainbow tables and junkness. I'll have to do some
more research in this area myself and start on that juicy 40gb download.




2007/8/16, Javier Bonet <jabonet@xxxxxxxxxx>:
>
> Thanks Adese. Yes bruteforce attack against a WPA are only posible when
> the key is no more than 8, and then only if they aren´t very imaginative.
>
> I have the possibility of capturing handshakes and there seems to be a few
> everyday, does aircrack support doing this?
>
> Where can I get a detailed information of the airodump, aircrack and air
> replay functions?
>
> J
>
> ----- Start Original Message -----
> Sent: Thu, 16 Aug 2007 10:09:26 -0400
> From: adese <adese0@xxxxxxxxx>
> To: kismac@xxxxxxxxxxxxx
> Subject: [kismac] Re: what is required to crack WPA?
>
> >
> > One only needs 1 handshake that indeed "can be captured". like I said
> earlier, it's captured when a client connects to an access point /
> router.
>
> bruteforcing with JTR could take a very long time. refer to this :
> http://lastbit.com/pswcalc.asp so you can start disappointing yourself.
>
> this is why you should at least try a dictionary attack with a real big
> wordlist before you try the lengthy task of bruteforcing.
>
> -adese
>
>
>
> 2007/8/16, Javier Bonet <jabonet@xxxxxxxxxx>:
>
>   How long could Jacktheripper take to crack WPA?
>
>   Is it possible to capture a handshake, how many handshake could you
>   need?
>
>   J
>
>   ----- Start Original Message -----
>   Sent: Tue, 14 Aug 2007 20:23:15 -0400
>   From: adese <adese0@xxxxxxxxx>
>   To: kismac@xxxxxxxxxxxxx
>   Subject: [kismac] Re: what is required to crack WPA?
>
>   > A "handshake" is needed to be captured in order to crack WPA. A
>   > handshake occurs when a client connects to an access point for the
>   > first time. i.e. when they turn their computer on and the computer
>   > autoconnects to the network a handshake packet occurs.
>   >
>   > There are only 2 ways to crack this, either by a dictionary attack
>   > using :
>   >
>   > aircrack-ng -a 2 -w dictionaryfile capturefile
>   >
>   > Or by brute force which requires an app like JohnTheRipper.
>   >
>   > For these reasons, WPA is very secure given one uses a
>   non-dictionary
>   > password.
>   >
>   > -adese
>   >
>   >
>   >
>   >
>   > On 14 aug 2007, at 19.59, Javier Bonet wrote:
>   >
>   > > What is required to crack WPA WLANs?
>   > >
>   > > what does the --WPA comands in aircrack-ng.
>   > >
>   > > J
>   > >
>   >
>   >
>   >
>
>   ----- End Original Message -----
>
>
> ----- End Original Message -----
>
>

Other related posts: