nws0291 wrote:Thanks guys for all your help. I'm currently at 120K unique IV's and tried a few weak scheduling attacks with no luck yet. My roomate keeps telling me I can't break into his router. I know I will soon enough to demonstrate how weak WEP is.
nws0291 wrote:Because he left the default login to the web interface. once I crack it I'll just change the bssid to his wep key :P
nws0291 wrote:Yeah I'm just proving that wep is weak so he should switch to WPA which is less weak.
theprez98 wrote:WEP can be cracked?!
theprez98 wrote:WEP can be cracked?!
beakmyn wrote:Not if the new Daylight Savings Time fix has been applied. It makes WEP almost as strong as WPA.
Dutch wrote:You are SOOOOO banned with that new avatar... I just spewed coffee over the new cushions on the front porch furniture. Oh and coffee coming out the nose does burn like hell in the nostrils...
Dutch
nws0291 wrote:Just for an Update the WEP has been cracked. For some reason reinjection worked while I was away from the computer for an hour but failed to work the past 3 days. I went from 200K to 600K unique IV in an hour. It had no problem cracking in less than 6 seconds :P
gm2net wrote:It needs the right type of packet (e.g. an ARP packet that generates a response). When you've got that packet, and it gets a response when it's placed back in, it works. If you're using a prism2 card, it also needs to have been sent as an 802.11b packet, not a g packet.
The problem being that the Prism2 chipset is 802.11b only.
We did play with the idea of capturing on the inbuilt AirPort hardware, and resending the packet on the prism2 card, but this would not be as straight forward as it appears. We also figured that getting an 802.11g USB card supported was a better idea. The Ralink driver is a little buggy, but it works. Also, ZyDas card support was somewhere on the list, you may see that someday.
Ralink cards will be supported for injection soon - keep an eye open for that.
Users browsing this forum: No registered users and 2 guests