View Single Post
StefanL's Avatar
Posts: 298 | Thanked: 341 times | Joined on Aug 2010 @ This world :)
#1136
Originally Posted by Estel View Post
No, I was injecting @ 500 packets/s. IVs capture ration was ~86/s, varying.

Anyway, as I've said in edit to latest post, even with 500k IVs aircrack-ng was unable to crack network WEP.

It would be great, if someone could confirm/deny this, by cracking WEP network without any client connected (this is a *must* requirement, as we do not want some 'legit' packets getting injected by accident resulting in ''legit' response, generating more 'legit' packets etc.) and via interactive injection.

/Estel
Aircrack-ng is not perfect, and still has a lot of limitations. Some of them include the type of packets captured when doing the PTW attack (default for fAircrack), length of WEP key (only handles 64bit and 128bit), etc.
__________________
My phone evolution: Nokia 7610 (RIP), N82 (RIP), BB9000 (RIP), N900, BB9760 (RIP), N8, BB9900, N9 64GB
Working : Python Gorillas (Maemo5) Faircrack0.50 Update (Maemo5)
Not so much : WPScrack (Maemo5)

Last edited by StefanL; 2012-01-15 at 06:50.
 

The Following User Says Thank You to StefanL For This Useful Post: