-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Package: wnpp Severity: wishlist
Package name: aircrack Version: 1.4.1 Upstream Author: Christophe Devine <devine AT iie DOT cnam DOT fr> URL: http://www.cr0.net:8040/code/network/ License: GPL Description: A reliable 802.11 sniffer and WEP key cracker --[ What is aircrack ? aircrack is a 802.11 WEP key cracker. It implements the so-called Fluhrer-Mantin-Shamir (FMS) attack, along with some new attacks by a talented hacker named KoreK. When enough encrypted packets have been gathered, aircrack can almost instantly recover the WEP key. --[ How does aircrack work ? Every WEP encrypted packet has an associated 3-byte initialization vector (IV). Some IVs leak information about a certain byte of the key, thus statistically the correct key emerges when a sufficient number of IVs have been collected. --[ How many packets are needed for recovering a WEP key ? It really depends on your luck and the way the IVs are distributed. Most of the time, 1M unique IVs (thus ~2M packets) are enough. If you're very lucky only 500K IVs may be required; and if you're out of luck you could need around 1.5M-2M unique IVs. --[ Is aircrack different from AirSnort ? It it much more efficient. AirSnort requires more than two million unique IVs to crack a 104-bit WEP key, whereas aircrack only needs twice less IVs. Additionnaly, post-2002 wifi equipments filter the "interesting" IVs AirSnort relies on; on the other hand, aircrack can break a WEP key without the need for said IVs. - -- Frederik Dannemare | mailto:[EMAIL PROTECTED] http://qa.debian.org/developer.php?login=Frederik+Dannemare http://frederik.dannemare.net | http://www.linuxworlddomination.dk Key fingerprint: BB7B 078A 0DBF 7663 180A F84A 2D25 FAD5 9C4E B5A8 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFBMMCJLSX61ZxOtagRAlQgAJ9FzLxMVGc9cAXlfdZW4WIM1rLUIQCeIZK1 Bztg7aHVyDx3cJxdach9ZPs= =nS4G -----END PGP SIGNATURE-----