You can't benchmark WEP. WPA/WPA2 ONLY.
Originally Posted by Eatme
When you say it didn't show, did you enable benchmarking?
Yes, Thanks for pointing out the WEP bug - it will be fix in v0.2. (I've been working on that at the mo, hence the delay.)
I may go back and update v0.1 if I get the time/remember.
I think I've already done what you said about CTRL+C. You can press that during an WEP attack, to skip a WEP attack method.
How much time would you like to wait? At the mo, its set to:
So it has 15 seconds to capture "100" IVs, if it doesn't - it moves on to the next attack.
timeWEP="15" # How long to wait for WEP attacks (e.g. 15 Seconds)
Thanks for the thanks! (=
Originally Posted by Kungen
Yes, this is already done. You can either edit wiffy.sh
OR you can start wiffy with
bash wiffy.sh -i wlan1 -e Linksys -w /path/to/wordlists.txt -x -v
*NOTE THE "-w" bit
Thanks for the thanks!
Originally Posted by Nazagul
A.) When you did it manually, did it work? Personally I've found that I can't attack if there isn't a client connected (using wiffy and doing it by hand )
B.) Yes, its on the to-do list. I may do it for v0.2/v0.3. Just need the code to code it
Does the folder exist? If it doesn't could you create it before you run wiffy?
Originally Posted by wikrie
Try and run it with "-v", see if it says "Moving handshake".
Does aircrack-ng start to try and crack the handshake?