[kismac] Re: KisMAC 0.12a preview

  • From: Theodore <theodore@xxxxxxxxxxx>
  • To: kismac@xxxxxxxxxxxxx
  • Date: Wed, 5 May 2004 13:00:47 -0500

Hash: SHA1

new installer works good

the newsham attack doesn't seem to want to work for my network, it runs a 40-bit ASCII attack, and then the error says that maybe the network wasn't 40/104 bit (mine's 104) .. so i guess I'm not sure if its suposed to work on 104, or if the error message is wrong, or if i don't have enough data for it to realize that its a 104bit network and run a 104bit attack.

- -- Theodore www.wpgwifi.com

BOFH excuse #126: it has Intel Inside

On 5-May-04, at 9:33 AM, Michael Rossberg wrote:


I need help again. I prepared a new kismac version over the weekend it contains the following advances over the LEAP version, that i gave out:

* major bug fix for the thing that Erik reported
* newsham attack has major speed improvements
* weak key detection bug fixed and a lot more sensitive
* better OS X look & feel due the usage of sheets instead of modal windows
* kismac will no longer try to use unsupported channels (and thus causing a crash of the card) - this is only interesting for misconfigurations
* the decrypt function accepts 40-bit windows passwords
* you can join a network by double clicking the network in the map view
* new install engine supports not overwriting of preferences & inital configuration wizard

i need feedback for the install engine and for the attacks. in particular, whether there are a lot of access points, which generate now weak keys, and did not before. these new weak keys will not revel the first bytes of the key but these could easily be bruteforced by a hybrid weak key/bruteforce attack, which i would write if it is found useful.
i would like to know whether the install engine, works out ok, since it is a complete rewrite.

download link: <http://binaervarianz.de/downloads.php? action=download&mirror=http&file_id=21>


Version: GnuPG v1.2.4 (Darwin)


Other related posts: