All of the interesting technological, artistic or just plain fun subjects I'd investigate if I had an infinite number of lifetimes. In other words, a dumping ground...

Friday 19 October 2007

Aircrack-ng & Airsnort & Kismet

http://en.wikipedia.org/wiki/Aircrack-ng
http://www.aircrack-ng.org/doku.php
http://en.wikipedia.org/wiki/AirSnort
http://en.wikipedia.org/wiki/Kismet_%28software%29

Aircrack is an 802.11 WEP and WPA-PSK keys cracking program that can
recover keys once enough data packets have been captured. It implements the
standard FMS attack along with some optimizations like KoreK attacks, thus
making the attack much faster compared to other WEP cracking tools. In
fact, aircrack is a set of tools for auditing wireless networks.

AirSnort is a Linux utility (using GTK+) for decrypting WEP encryption on
an 802.11b network. A Windows port also exists. Distributed under the GNU
General Public License,[1] AirSnort is free software.


Scott Fluhrer, Itsik Mantin and Adi Shamir (who was one of the inventors of
the RSA encryption algorithm) released a paper entitled Weaknesses in the
Key Scheduling Algorithm of RC4. Based on the security flaws described
therein, Blake Hegerle and Jeremy Bruestle wrote a tool that must only
gather roughly five to ten million encrypted packets from a wireless access
point before it can attempt to recover the wireless key. Depending on the
environment, this can take as little as a few minutes or more commonly a
few hours and possibly a few days.

Kismet is a network detector, packet sniffer, and intrusion detection
system for 802.11 wireless LANs. Kismet will work with any wireless card
which supports raw monitoring mode, and can sniff 802.11b, 802.11a and
802.11g traffic. The program runs under Linux, FreeBSD, NetBSD, OpenBSD,
and Mac OS X. The client can also run on Windows, although a drone is the
only compatible packet source.

No comments:

tim's shared items

Blog Archive

Add to Google Reader or Homepage