Results 1 to 5 of 5

Thread: Aircrack gives different results

Hybrid View

  1. #1
    Junior Member
    Join Date
    Sep 2007
    Posts
    37

    Default Aircrack gives different results

    Running Etch now and managed to scrpae off 364k IV's. The rate wasnt high only about 100 to 250 IV's per second. I have set my own
    64 bit key to e5d4c3b2a1. Without any options aircrack-ng would not decode, however with the -n64 option results were soon displayed:

    aircrack-ng -n64 test_WEP.ivs

    Aircrack-ng 0.9.1

    [00:00:00] Tested 752 keys (got 364851 IVs)

    KB depth byte(vote)
    0 0/ 2 E5( 38) A7( 8) CE( 5) 0A( 3) 13( 3) 2A( 3) 8C( 3) C5( 3) D2( 3) 01( 0) 06( 0)
    1 1/ 9 5C( 32) 78( 15) 64( 13) E4( 13) E5( 13) 1D( 12) 54( 12) 5E( 9) 21( 6) 0E( 5) 12( 5)
    2 1/ 1 01( 0) 02( 0) 03( 0) 04( 0) 05( 0) 06( 0) 07( 0) 08( 0) 09( 0) 0A( 0) 0B( 0)

    KEY FOUND! [ E54:C36:4D ]
    Decrypted correctly: 0%

    E5( 38) A7( 8) CE( 5) 0A( 3) 13( 3) 2A( 3) 8C( 3) C5( 3) D2( 3) 01( 0) 06( 0)
    1 1/ 9 5C( 32) 78( 15) 64( 13) E4( 13) E5( 13) 1D( 12) 54( 12) 5E( 9) 21( 6) 0E( 5) 12( 5)
    2 1/ 1 01( 0) 02( 0) 03( 0) 04( 0) 05( 0) 06( 0) 07( 0) 08( 0) 09( 0) 0A( 0) 0B( 0)

    KEY FOUND! [ E54:C3:B2:A1 ]
    Decrypted correctly: 0%


    I only collected IV's, no beacons this time. A previous file containing some 260,000 IVs with beacons was 44M, this time using --ivs the file was only 1.2M.

    The last decrypt is correct but why do i get a different key each time I run aircrack? Also the number of keys tested varies. I am guessing that the algorithm starts off at a different each time in the file.
    Thanks in advance.

  2. #2
    Member imported_rokrmc's Avatar
    Join Date
    Aug 2007
    Posts
    155

    Default

    Quote Originally Posted by mephisto View Post
    Running Etch now and managed to scrpae off 364k IV's. The rate wasnt high only about 100 to 250 IV's per second. I have set my own
    64 bit key to e5d4c3b2a1. Without any options aircrack-ng would not decode, however with the -n64 option results were soon displayed:

    aircrack-ng -n64 test_WEP.ivs

    Aircrack-ng 0.9.1

    [00:00:00] Tested 752 keys (got 364851 IVs)

    KB depth byte(vote)
    0 0/ 2 E5( 38) A7( 8) CE( 5) 0A( 3) 13( 3) 2A( 3) 8C( 3) C5( 3) D2( 3) 01( 0) 06( 0)
    1 1/ 9 5C( 32) 78( 15) 64( 13) E4( 13) E5( 13) 1D( 12) 54( 12) 5E( 9) 21( 6) 0E( 5) 12( 5)
    2 1/ 1 01( 0) 02( 0) 03( 0) 04( 0) 05( 0) 06( 0) 07( 0) 08( 0) 09( 0) 0A( 0) 0B( 0)

    KEY FOUND! [ E54:C36:4D ]
    Decrypted correctly: 0%

    E5( 38) A7( 8) CE( 5) 0A( 3) 13( 3) 2A( 3) 8C( 3) C5( 3) D2( 3) 01( 0) 06( 0)
    1 1/ 9 5C( 32) 78( 15) 64( 13) E4( 13) E5( 13) 1D( 12) 54( 12) 5E( 9) 21( 6) 0E( 5) 12( 5)
    2 1/ 1 01( 0) 02( 0) 03( 0) 04( 0) 05( 0) 06( 0) 07( 0) 08( 0) 09( 0) 0A( 0) 0B( 0)

    KEY FOUND! [ E54:C3:B2:A1 ]
    Decrypted correctly: 0%


    I only collected IV's, no beacons this time. A previous file containing some 260,000 IVs with beacons was 44M, this time using --ivs the file was only 1.2M.

    The last decrypt is correct but why do i get a different key each time I run aircrack? Also the number of keys tested varies. I am guessing that the algorithm starts off at a different each time in the file.
    Thanks in advance.
    So which 1 the right key?You know key if that is your ap.If the key is not match with the right key you should try again.

  3. #3
    Developer balding_parrot's Avatar
    Join Date
    May 2007
    Posts
    3,399

    Default

    Quote Originally Posted by rokrmc View Post
    So which 1 the right key?You know key if that is your ap.If the key is not match with the right key you should try again.
    He told you what the right key was.

    Uptate to a newer version of aircrack and you should find that that problem will in 99% of cases go away.

  4. #4
    Senior Member shamanvirtuel's Avatar
    Join Date
    Mar 2010
    Location
    Somewhere in the "Ex" human right country
    Posts
    2,988

    Default

    most of time you can make it solved by adding the bssid switch to aircrack command....
    Watch your back, your packetz will belong to me soon... xD

    BackTrack :
    Giving Machine Guns to Monkeys since 2006

  5. #5
    Member notlist3d's Avatar
    Join Date
    Jan 2010
    Posts
    116

    Default

    Use the ptw option -z in that version of aircrack. http://www.aircrack-ng.org/doku.php?...tw%200%209%201

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •