Page 1 of 2 12 LastLast
Results 1 to 10 of 12

Thread: If 30,000 ivs are good, isn't 40,000 better?

  1. #1
    Member
    Join Date
    Aug 2007
    Posts
    231

    Default If 30,000 ivs are good, isn't 40,000 better?

    Apparently not.

    I was practicing capturing my access point to create a file that I could run testing on. Aircrack-ng cracked the key with 31,000 ivs captured. I let my capturing continue, thinking that if 31,000 was good, well 35,000 would be better than good.

    Well, no, actually. I ran aircrack-ng again at 35,000 and it returned "FAILED - TRYING AGAIN AT 40,000". Note that nothing had changed between the original crack and now - everything just kept running. It also failed at 40,000.

    My guess is that the cracking engine is seeded with a random number, and that some are better than others. If this IS the case, why doesn't aircrack just continue to try other seeds if the one previously chosen doesn't converge, especially after 30,000 ivs? I don't have a file that is only 31,000 or so ivs long to test (I went to dinner and came back with the ivs being up to 70,000, which seems to always converge). I was just wondering if anyone else noticed this.

  2. #2
    Senior Member shamanvirtuel's Avatar
    Join Date
    Mar 2010
    Location
    Somewhere in the "Ex" human right country
    Posts
    2,988

    Default

    aircrack-ptw will never failed..........
    Watch your back, your packetz will belong to me soon... xD

    BackTrack :
    Giving Machine Guns to Monkeys since 2006

  3. #3
    Member
    Join Date
    Aug 2007
    Posts
    231

    Default

    I am using version 0.9.1. with the -z option.

  4. #4
    Senior Member shamanvirtuel's Avatar
    Join Date
    Mar 2010
    Location
    Somewhere in the "Ex" human right country
    Posts
    2,988

    Default

    aircrack-ptw is the tool on wich -z attack of aircrack-ng is based

    it's the ORIGINAL ptw attack.....

    i never see it fails ......

    and the computation takes 3 secs......
    Watch your back, your packetz will belong to me soon... xD

    BackTrack :
    Giving Machine Guns to Monkeys since 2006

  5. #5
    Member
    Join Date
    Aug 2007
    Posts
    231

    Default

    Quote Originally Posted by shamanvirtuel View Post
    aircrack-ptw will never failed..........
    By aircrack-ptw, do you mean the development version 1.0 executable aircrack-ng?

  6. #6
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    More is always better when concerning IVS...

    some luck comes into play, as well as all your arguments and options you use...

    SLK001,

    What is the EXACT command line you use wien you crack your WEP key??
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  7. #7
    Member
    Join Date
    Aug 2007
    Posts
    231

    Default

    Exact command:

    aircrack-ng -z linksys*.cap

  8. #8
    Member
    Join Date
    Aug 2007
    Posts
    231

    Default

    One extra note. I used the latest stable version, or 0.9.1 in these tests. I did try the latest development release - 1.0Dev - and did notice that it cracks in less than 2 seconds, where the stable release took 15-20 seconds. Even so, I would have expected a crack for any number of ivs above the original number of the first crack.

  9. #9
    EnculeurDePoules
    Guest

    Default

    Quote Originally Posted by SLK001 View Post
    Apparently not.

    I was practicing capturing my access point to create a file that I could run testing on. Aircrack-ng cracked the key with 31,000 ivs captured. I let my capturing continue, thinking that if 31,000 was good, well 35,000 would be better than good.

    Well, no, actually. I ran aircrack-ng again at 35,000 and it returned "FAILED - TRYING AGAIN AT 40,000". Note that nothing had changed between the original crack and now - everything just kept running. It also failed at 40,000.

    My guess is that the cracking engine is seeded with a random number, and that some are better than others. If this IS the case, why doesn't aircrack just continue to try other seeds if the one previously chosen doesn't converge, especially after 30,000 ivs? I don't have a file that is only 31,000 or so ivs long to test (I went to dinner and came back with the ivs being up to 70,000, which seems to always converge). I was just wondering if anyone else noticed this.
    hm the rule is not 300 000 ivs for a 64bit wep key, and 1 million for a 128k wep key???
    I think it was!

  10. #10
    Senior Member shamanvirtuel's Avatar
    Join Date
    Mar 2010
    Location
    Somewhere in the "Ex" human right country
    Posts
    2,988

    Default

    nop the rules are 10/15000 for 64
    30000/50000 128

    with PTW attack of course
    Watch your back, your packetz will belong to me soon... xD

    BackTrack :
    Giving Machine Guns to Monkeys since 2006

Page 1 of 2 12 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •