-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Package: wnpp
Severity: wishlist

Package name: aircrack
Version: 1.4.1
Upstream Author: Christophe Devine <devine AT iie DOT cnam DOT fr>
URL: http://www.cr0.net:8040/code/network/
License: GPL
Description: A reliable 802.11 sniffer and WEP key cracker

    --[ What is aircrack ?

aircrack is a 802.11 WEP key cracker.  It implements the so-called
Fluhrer-Mantin-Shamir (FMS) attack, along with some new attacks by
a talented hacker named KoreK.  When enough encrypted packets have
been gathered, aircrack can almost instantly recover the WEP key.


    --[ How does aircrack work ?

Every WEP encrypted packet has an associated 3-byte initialization
vector (IV). Some IVs leak information about a certain byte of the
key, thus  statistically the correct key emerges when a sufficient
number of IVs have been collected.


    --[ How many packets are needed for recovering a WEP key ?

It really depends on your luck and the way the IVs are distributed.
Most  of the time, 1M unique IVs (thus ~2M packets) are enough. If
you're very lucky only 500K IVs may be required; and if you're out
of luck you could need around 1.5M-2M unique IVs.


    --[ Is aircrack different from AirSnort ?

It it much more efficient. AirSnort requires more than two million
unique IVs to crack a 104-bit WEP key, whereas aircrack only needs
twice less IVs. Additionnaly, post-2002 wifi equipments filter the
"interesting" IVs  AirSnort relies on; on the other hand, aircrack
can break a WEP key without the need for said IVs.

- -- 
Frederik Dannemare | mailto:[EMAIL PROTECTED]
http://qa.debian.org/developer.php?login=Frederik+Dannemare
http://frederik.dannemare.net | http://www.linuxworlddomination.dk
Key fingerprint: BB7B 078A 0DBF 7663 180A  F84A 2D25 FAD5 9C4E B5A8
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFBMMCJLSX61ZxOtagRAlQgAJ9FzLxMVGc9cAXlfdZW4WIM1rLUIQCeIZK1
Bztg7aHVyDx3cJxdach9ZPs=
=nS4G
-----END PGP SIGNATURE-----

Reply via email to