[kismac] Re: A beginners question

  • From: pgcudahy <pgcudahy@xxxxxxxxxxxxxxxxxxx>
  • To: <kismac@xxxxxxxxxxxxx>, Joe Roth <oundleuk@xxxxxxxxxxx>
  • Date: Tue, 2 Sep 2003 14:26:36 -0700

Yeah, it is kind of confusing at first how to go 'bout cracking an AP. What I 
do is in the preference panel have it checked to "Save data packets only" or 
something like that. Since you need a ton of packets you generally can't get 
enough weak packets from one scanning session. When you finish your first 
session just do the regular file->save and name it after your location i.e. 
"home". That'll give you a home.kismac file which you should open when you're 
ready to do a second scan at the same location. After you open it, hit scan, 
and the new results will add on to your saved ones. After many, many nights of 
this (or a few if you're lucky) you'll get 500-1000 weak packets and can then 
go to the crack menu and try a weak scheduling attack. Good luck!
-Patrick Cudahy

>===== Original Message From Joe Roth <oundleuk@xxxxxxxxxxx> =====
>I downloaded and installed KISMAC and wanted to try to crack the wep key on
>my own AP and am a bit confused on how to do it. I wanted to prove the wep
>vulnerability at work by demonstrating at home.   My wep key is 40 bit.  I
>assume that I have to turn the dump filter on to some other setting than No
>dumping and then run decrypt PCAP dump.  Could someone verify this?  I am
>running a powerbook g5 with only the one airport card.  I assume I cant use
>the crack features with existing setup.  Only the VIHA driver seems to work.
>Thanks for tolerating my newbie question.

Other related posts: