View Single Post
Estel's Avatar
Posts: 5,028 | Thanked: 8,613 times | Joined on Mar 2011
#1145
Originally Posted by StefanL View Post
Aircrack-ng is not perfect, and still has a lot of limitations. Some of them include the type of packets captured when doing the PTW attack (default for fAircrack), length of WEP key (only handles 64bit and 128bit), etc.
judging by the document You've provided, the problem is that aircrack-ng uses '-z' by default, which is only valid for proper ARP messages and responses. AFAIUI, to use statistical methods (on IVs that we gathered using our spurious data), we should apply '-K', which result in fallback to FMS/KoreK/Bruteforce method. It require *much* more IVs - at least ~500k for 64 bit key, and ~2,5M-5M for 128 bit key, but it have chance to work actually.

It may seems harsh, but for APs without clients connected, it's still much faster (most of the times) than waiting for someone to connect.

/Estel
__________________
N900's aluminum backcover / body replacement
-
N900's HDMI-Out
-
Camera cover MOD
-
Measure battery's real capacity on-device
-
TrueCrypt 7.1 | ereswap | bnf
-
Hardware's mods research is costly. To support my work, please consider donating. Thank You!
 

The Following User Says Thank You to Estel For This Useful Post: