This shows you the differences between two versions of the page.
Both sides previous revision Previous revision | Next revision Both sides next revision | ||
easside-ng [2009/09/05 23:27] mister_x wiki-files.aircrack-ng.org become download.aircrack-ng.org/wiki-files |
easside-ng [2009/09/05 23:27] mister_x wiki-files.aircrack-ng.org become download.aircrack-ng.org/wiki-files |
||
---|---|---|---|
Line 97: | Line 97: | ||
Basically, the program obtains a small amount of keying material from the packet then attempts to send packets with known content to the access point (AP). If the packet is successfully echoed back by the AP then a larger amount of keying information can be obtained from the returned packet. | Basically, the program obtains a small amount of keying material from the packet then attempts to send packets with known content to the access point (AP). If the packet is successfully echoed back by the AP then a larger amount of keying information can be obtained from the returned packet. | ||
- | The original paper, [[http:// | + | The original paper, [[http:// |
==== Linear Keystream Expansion Technique ==== | ==== Linear Keystream Expansion Technique ==== |