*This message was transferred with a trial version of CommuniGate(tm) Pro* I got the cracking to work after I went from 5d4 back to the stable release (5b). Although when I chose the brute force attack that tries all characters, I get the "cracking" progress indicator. But it never moves forward. Maybe I am impatient. I imagine this takes a LONG time to do. The mathematics involved kind of boggle the mind. So I am just going to let it sit. Perhaps overnight. I know for a fact that the access point I am attempting to crack is 128 bit. And these brute force attacks are only 40-bit. Is there support planned for a 128/104/100 brute force attack? I am thinking that the time it would take to complete would be extreme. And maybe this is why the option doesn't exist. Mick, this is a wonderful tool. I have had some great fun with my Mac. Netstumbler pales in comparison. ;-) -Ray Haque > it is much easier. just select the network you want to crack and choose > the right attack. pcap dumps are only for export into other programs > such as ethereal. > please note that there is a bug in current kismac implementations, > which can prevent the working window from disappearing, if the cracking > process is too fast (yes it is weired). > > mick