[ale] Wifi craking distro
Greg Freemyer
greg.freemyer at gmail.com
Thu May 6 15:35:35 EDT 2010
Chris,
I'm not sure its as fast as people make it sound.
I worked with a IT Security Posture expert recently doing a security
posture eval.
They were using WEP, so we thought we'd hack it just to show how easy
it was and encourage them to move off WEP.
We let the cracker run for 4 hours with lots of wireless activity
going on and it still had not provided the key. We shut it down and
gave up since it wasn't a big deal anyway.
The Security expert said a few hours was not unusual and that the 10
minutes often quoted was unrealistic.
fyi: I think it was a windows based tool, but I imagine the speed is
similar to a linux tool.
Greg
On Thu, May 6, 2010 at 2:34 PM, Chris Fowler
<cfowler at outpostsentinel.com> wrote:
> I've read this article on /. and it has gotten me interested:
>
> http://it.slashdot.org/story/10/05/05/2142208/Hot-Sales-In-China-For-Wi-Fi-Key-Cracking-Kits?art_pos=22
>
> I'm looking for a USB dongle based system that I can boot up and
> immediately start cracking keys for wireless networks. I'll run this on
> an Acer Aspire D250.
>
> The primary goal is for demonstration. In a few months the Atlanta
> Radio Club is going to have a presentation about 802.11b/g security. My
> plan is to have an AP and 2 wireless stations sending data back and
> forth. I want to use the dongle to showcase how easy it is for someone
> to hack into your network and then showcase prevention measures. I'm
> looking for something that will boot, start X, and then work. I've
> tried installing some programs on Ubuntu 9.10 and it was not an easy
> task. There was a ramp up. This presentation will last about an hour
> so within the first 30 minutes the network needs to be cracked.
>
> any suggestions?
>
> Chris
>
>
> _______________________________________________
> Ale mailing list
> Ale at ale.org
> http://mail.ale.org/mailman/listinfo/ale
> See JOBS, ANNOUNCE and SCHOOLS lists at
> http://mail.ale.org/mailman/listinfo
>
--
Greg Freemyer
Head of EDD Tape Extraction and Processing team
Litigation Triage Solutions Specialist
http://www.linkedin.com/in/gregfreemyer
CNN/TruTV Aired Forensic Imaging Demo -
http://insession.blogs.cnn.com/2010/03/23/how-computer-evidence-gets-retrieved/
The Norcross Group
The Intersection of Evidence & Technology
http://www.norcrossgroup.com
More information about the Ale
mailing list