[kismac] Re: Successfully cracked, but what now?

  • From: devnullian@xxxxxxx
  • To: kismac@xxxxxxxxxxxxx
  • Date: Mon, 19 Jun 2006 15:36:50 -0600

spoofmac is kinda tricky. to get it to work, you have to use it without having joined a network since your last restart. One way to do this, which is annoying, but protects you from some particularly crafty wireless attacks, is to remove all APs from your "preferred networks" list (under airport in sytem prefs) so that you have to manually join every access point. Then, to spoof, restart, run spoofmac, then try to associate to the ap.

Not using preferred networks is kinda annoying, but it does protect you from the "karma" attack where the attacker listens to your wireless card as it searches for its preferred networks and then creates an AP with the name of one of your preferred networks for you to join.

On Jun 19, 2006, at 10:31 AM, el_criuz wrote:

May be possible but I don't think so.
I already tried SpoofMac but the app doesnt work for me (although I use it on a G4 1,67 Powerbook)
When I try to spoof my airport card the result is just 00:00:00:00:00 and not the adress I wanted to spoof.
I need to restart my computer in order to use any network card then.



On 19.06.2006, at 18:19, Stefan Jeglinski wrote:

I tried normal, hex and ascii but none of them worked.
The hex value that kismac tells me to be the key consists just of numbers.
I collected the weak packets over quite a long time (5 days) is it possible that the key got screwed up by something?

Is is possible that something else is preventing you from joining the network? MAC filtering for example?



Stefan Jeglinski





Other related posts: