fragmentation
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | |||
fragmentation [2008/09/08 23:07] – Added troubleshooting tip for "Not enough acks, repeating" message darkaudax | fragmentation [2009/09/05 23:32] (current) – wiki-files.aircrack-ng.org become download.aircrack-ng.org/wiki-files mister_x | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== Fragmentation Attack ====== | ====== Fragmentation Attack ====== | ||
- | |||
- | |||
- | |||
- | |||
- | |||
===== Description ===== | ===== Description ===== | ||
This attack, when successful, can obtain 1500 bytes of PRGA (pseudo random generation algorithm). This attack does not recover the WEP key itself, but merely obtains the PRGA. The PRGA can then be used to generate packets with [[packetforge-ng]] which are in turn used for various injection attacks. | This attack, when successful, can obtain 1500 bytes of PRGA (pseudo random generation algorithm). This attack does not recover the WEP key itself, but merely obtains the PRGA. The PRGA can then be used to generate packets with [[packetforge-ng]] which are in turn used for various injection attacks. | ||
Line 10: | Line 5: | ||
Basically, the program obtains a small amount of keying material from the packet then attempts to send ARP and/or LLC packets with known content to the access point (AP). If the packet is successfully echoed back by the AP then a larger amount of keying information can be obtained from the returned packet. | Basically, the program obtains a small amount of keying material from the packet then attempts to send ARP and/or LLC packets with known content to the access point (AP). If the packet is successfully echoed back by the AP then a larger amount of keying information can be obtained from the returned packet. | ||
- | The original paper, [[http:// | + | The original paper, [[http:// |
===== Usage ===== | ===== Usage ===== |
fragmentation.txt · Last modified: 2009/09/05 23:32 by mister_x