Re: testing wireless security

看板FB_security作者時間18年前 (2007/11/20 08:09), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串3/4 (看更多)
Josh Paetzel wrote: > When I looked in to this it seemed that the current state of affairs is that > WPA can only be broken by brute-forcing the key. I don't recall if that > could be done 'off-line' or not. My memory is that the needed info to > attempt bruteforcing could be done by simply receiving....no need to attempt > to associate to the AP was needed. I'm not really interested in > disseminating links to tools that can be used to break wireless security, but > simple google searches will give you the info you need.....and the tools are > in the ports tree for the most part. > > Fortunately WPA allows keys that put even resource-rich attackers in to the > decade range to bruteforce. > That would not appear to be a limitation of aircrack-ng http://www.freshports.org/net-mgmt/aircrack-ng/ aircrack is an 802.11 WEP and WPA-PSK keys cracking program that can recover this keys once enough encrypted packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, thus making the attack much faster compared to other WEP cracking tools. In fact aircrack is a set of tools for auditing wireless networks. That said, I haven't (yet) tried it myself ;) -- Said one park ranger, 'There is considerable overlap between the intelligence of the smartest bears and the dumbest tourists.' Mark D. Foster, CISSP <mark@foster.cc> http://mark.foster.cc/ _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #17GYMe00 (FB_security)
文章代碼(AID): #17GYMe00 (FB_security)