System Tools

airsnort - Wireless LAN (WLAN) tool which recovers encryption keys

AirSnort is a wireless LAN (WLAN) tool which recovers encryption keys.
AirSnort operates by passively monitoring transmissions, computing the
encryption key when enough packets have been gathered.

802.11b, using the Wired Equivalent Protocol (WEP), is crippled with numerous
security flaws. Most damning of these is the weakness described in " Weaknesses
in the Key Scheduling Algorithm of RC4 " by Scott Fluhrer, Itsik Mantin and Adi
Shamir. Adam Stubblefield was the first to implement this attack, but he has
not made his software public. AirSnort, along with WEPCrack, which was released
about the same time as AirSnort, are the first publicly available
implementaions of this attack.

AirSnort requires approximately 5-10 million encrypted packets to be gathered.
Once enough packets have been gathered, AirSnort can guess the encryption
password in under a second.
License:GPL Group:System Tools
URL:http://airsnort.shmoo.com/ Source: airsnort

Packages

Name Version Release Type Size Built
airsnort 0.2.7e 8.fc5 ppc 149 KiB Tue Feb 14 09:27:57 2006

Changelog

* Tue Feb 14 17:00:00 2006 Andreas Bierfert <andreas.bierfert[AT]lowlatency.de>
0.2.7e-8
- Rebuild for Fedora Extras 5
* Wed Nov 16 17:00:00 2005 Andreas Bierfert <andreas.bierfert[AT]lowlatency.de>
0.2.7e-7
- remove xorg-x11-devel BR
- rebuild
* Sun Aug 21 18:00:00 2005 Andreas Bierfert <andreas.bierfert[AT]lowlatency.de>
0.2.7e-6
- rebuild

Listing created by RepoView-0.5.2-1.fc6 (modified)