Bugreports for the Aircrack suite, version 2.2betaX
Posted: Wed Jun 29, 2005 6:05 am
Occasional "Write buffer full." error, and exiting of aireplay during arp replay attack.
Atheros based 802.11b/g card, using MadWiFi drivers pulled from CVS 06292005, and patched with the MadWiFi patch from the first aireplay 2.2 beta.
Restarting aireplay sometimes works, sometimes give the same error.
When it works, it works well, giving me appr. 23000 unique IV's pr. minute.
Managed to detect my test AP's 128 bit wep key within 10 minutes (including fake authentication, chopchop'ing packet , generating an arp packet with arpforge, reinjecting and collecting 203394 unique IV's), when using fudge factor 4 for aircrack.
Admittedly a very easy key used on the test setup (00:00:00:00:00:00:00:00:00:00:00:00:00), but just shows that WEP, even 128bit, as a security measure is FUBAR...
Dutch
Atheros based 802.11b/g card, using MadWiFi drivers pulled from CVS 06292005, and patched with the MadWiFi patch from the first aireplay 2.2 beta.
Restarting aireplay sometimes works, sometimes give the same error.
When it works, it works well, giving me appr. 23000 unique IV's pr. minute.
Managed to detect my test AP's 128 bit wep key within 10 minutes (including fake authentication, chopchop'ing packet , generating an arp packet with arpforge, reinjecting and collecting 203394 unique IV's), when using fudge factor 4 for aircrack.
Admittedly a very easy key used on the test setup (00:00:00:00:00:00:00:00:00:00:00:00:00), but just shows that WEP, even 128bit, as a security measure is FUBAR...
Dutch