IBM had a tool that did what you want, but I don't know if they released it
publically.  They had it running on an Ipaq with linux.  You'll have to
search for it though.

Airsnort is strictly for cracking the WEP key.  You use the capture program
to grab enough interesting packets (usually have to sniff from 100MB to a
gig to get enough), and then you run the crack on the data you have
collected.  If you've collected enough, it will crack the key in about 1
second.  If you don't have enough, you can change the breadth to guess, but
this can take a LONG time.

Jay

-----Original Message-----
From: Nate Carlson [mailto:natecars at real-time.com]
Sent: Wednesday, September 12, 2001 3:21 PM
To: tclug-list at mn-linux.org
Subject: Re: [TCLUG] 802.11b: Sniffing for ESSID


On Wed, 12 Sep 2001, Ben Lutgens wrote:
> airsort?

airsnort doesn't appear to do crap on unencrypted networks.. basically,
from what i've gleaned by running it, it just saves the "interesting"
packets, which can be later decrypted. if there's no encryption, there's
no interesting packets.

-- 
Nate Carlson <natecars at real-time.com>   | Phone : (952)943-8700
http://www.real-time.com                | Fax   : (952)943-8500


_______________________________________________
tclug-list mailing list
tclug-list at mn-linux.org
https://mailman.mn-linux.org/mailman/listinfo/tclug-list