Penetration Testing mailing list archives

Re: Cracking WEP and WPA keys


From: Dave Bush <hockeystatman () gmail com>
Date: Tue, 13 Dec 2005 13:10:15 -0500

On 12/13/05, Robin Wood <dninja () gmail com> wrote:

Can you remember how many packets you captured for the 10 second crack?

I was running with 1million generated using aireplay of a captured packet=
.


Off the top of my head, no I don't. My test environment was just having the
one system transfer a lot of data to another system while looking for IV
collisions on a third system.

If you were just replaying the same packet over and over I'm not sure that
that's good enough. The easiest approach would be something like I did by
using three systems. If you don't have a third system but you have two, then
have one system repeatedly download many small files or a couple large ones
(if you've been meaning to download something like Knoppix STD, here's a
good time to do it!) while running airodump on the second system.

A capture of approximately one hour of steady traffic at 11 MB from a
802.11B card to a 802.11G card was sufficient for aircrack to crack my WEP
key from my testing. Your mileage may vary.

--
Dave Bush <hockeystatman () gmail com>

There are two seasons in my world - Hockey and Construction

------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner:

Hackers are concentrating their efforts on attacking applications on your
website. Up to 75% of cyber attacks are launched on shopping carts, forms,
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are
futile against web application hacking. Check your website for vulnerabilities
to SQL injection, Cross site scripting and other web attacks before hackers do!
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------


Current thread: