On 31-May-06, at 1:32 AM, themacuser wrote:
It might be longer or shorter than the key length - 5 characters for 40 bit, or 13 characters for 104 bit. Thereby, it was hashed, and the hashed password can't exactly be recovered.
There's no CRC with the hash, so we don't even know the word is right or not.
The hex key is enough to join the network, so what's the point really?
On 31/05/2006, at 2:51 PM, Patrick Cudahy wrote:
Oh, and the router belongs to my neighbor. He knows what I'm doing and wanted to see what was possible with kisMAC. The only hint he gave is me is that he entered an alphanumeric password, so it's been converted somehow to hex. I also tried Adem's hex converter but it only spit out gibberish. My neighbor's not some l33t hax0r who's gonna have a randomly generated password. It'll be something like "fluffy" or good old "password".
On May 31, 2006, at 12:13 AM, Patrick Cudahy wrote:
I'm not sure what the plaintext / hex relationship is in WEP, but it was a WEP secured router that I cracked with Newsham's and KisMAC spit out 5 hex values. I went to connect with airport and put in those values and it let me in. I was just wondering if there was anyway to get from those hex digits to what the "real" password is.
On May 30, 2006, at 11:40 PM, themacuser wrote:
Or the network key could have just been a hex key? Or it was hashed down from an ASCII value?
Anyway, you can just type the hex into the password field of the airport join screen with 0x in front of it
On 31/05/2006, at 9:39 AM, J.T. Thompson wrote:
what did you exactly crack? a wep password? chances are thats the password to the network you cracked.. is it like 10 letters long? wep passwords are normaly 10char long..