well... my battery ran out while running weplab previously, so I don't know how that turned out.
I'll give the new version a shot.
topolb wrote:The FMS attack is the vulnerability used by airsnort and wepcrack. However these tools didn't implemented the attack fine.
Instead of consider all the set of weak packets, they just use an small subset. That's why they detect so few weak packets.
The first tool that implemented the FMS attack with the entire weak packets set, was dwepcrack by h1kari. H1kari wrote a paper describing the problem with wepcrack and airsnort and suggested some optimizations over the standar FMS attack algorithm. He wrote dwepcrack (only for *BSD) that had some of these optimizations, but not all of them.
Weplab should work with any wireless card that supports monitor mode. The problem is that I just have a prism2 based card so I don't know if other card's drivers adds some special header or tail to the packets, or sniffs over another DATALINK. I'll do my best to make weplab work with any card with to your feedback
Users browsing this forum: No registered users and 2 guests