Yeah, it is kind of confusing at first how to go 'bout cracking an AP. What I do is in the preference panel have it checked to "Save data packets only" or something like that. Since you need a ton of packets you generally can't get enough weak packets from one scanning session. When you finish your first session just do the regular file->save and name it after your location i.e. "home". That'll give you a home.kismac file which you should open when you're ready to do a second scan at the same location. After you open it, hit scan, and the new results will add on to your saved ones. After many, many nights of this (or a few if you're lucky) you'll get 500-1000 weak packets and can then go to the crack menu and try a weak scheduling attack. Good luck! -Patrick Cudahy >===== Original Message From Joe Roth <oundleuk@xxxxxxxxxxx> ===== >I downloaded and installed KISMAC and wanted to try to crack the wep key on >my own AP and am a bit confused on how to do it. I wanted to prove the wep >vulnerability at work by demonstrating at home. My wep key is 40 bit. I >assume that I have to turn the dump filter on to some other setting than No >dumping and then run decrypt PCAP dump. Could someone verify this? I am >running a powerbook g5 with only the one airport card. I assume I cant use >the crack features with existing setup. Only the VIHA driver seems to work. > >Thanks for tolerating my newbie question.