Kismet Plugin PTW
Wireless 802.11b monitoring tool - Plugin PTW
Kismet is a 802.11b wireless network sniffer. It is capable of sniffing
using almost any supported wireless card using the Airo, HostAP, Wlan-NG,
and Orinoco (with a kernel patch) drivers.
Kismet is a command-line only program and so should be used inside
X Terminal.
WARNING: This plugin can cause heavy load.
Kismet-PTW is a Kismet plugin which performs the Aircrack-NG PTW attack
against data captured by Kismet.
The Aircrack-NG PTW attack exploits flaws in WEP to expose the original
keystream. Because the PTW attack needs relatively few packets (50,000
to 100,000) and is relatively CPU cheap, it makes sense to include this
as an automatic feature.
While Aircrack-NG can use injection to accelerate the rate at which
packets are generated, increasing the chances of deriving the key, the
Kismet-PTW version is 100% passive. Kismet will NOT inject packets or
actively attack a network, with this plugin it will simply examine the
data it has already recorded.
The code for the PTW attack is directly extracted from Aircrack-NG, this
plugin simply wraps the Aircrack-NG library into a form Kismet can use
directly. For complete info about the PTW attack or Aircrack, see the
Aircrack-NG project at:
http://www.aircrack-ng.org
Section:
user/network
Releases
Repository | Latest version |
Fremantle Extras-devel free armel | kismet-plugin-ptw 2010.01.R1-r3028-1 |
Fremantle Extras-devel free i386 | kismet-plugin-ptw 2010.01.R1-r3028-1 |
Package events
Package | Repository | Event type | User | Timestamp |
kismet-plugin-ptw | Fremantle Extras-devel free armel | Old version cleaned by repository management | System | 2011-12-02 23:03 UTC |
kismet-plugin-ptw | Fremantle Extras-devel free armel | Package imported | System | 2011-12-02 14:42 UTC |
kismet-plugin-ptw 2010.01.R1-r3028-1 | Fremantle Extras-devel free i386 | Package imported | System | 2010-05-11 13:40 UTC |
kismet-plugin-ptw 2010.01.R1-r3028-1 | Fremantle Extras-devel free armel | Package imported | System | 2010-05-11 13:38 UTC |