I'm sure I read in another post (or the wiki) that WPA was working at least.
On Fri, May 16, 2008 at 6:03 PM, Brandon Kruse <[EMAIL PROTECTED]> wrote: > I have a number of programs that I use, and some that I wrote, for > professional security pen testing (with permission). > > I was thinking of making a quick package for doing this automagically. > > (btw, does the neo support wpa/wpa2?) > > At the very least, it can cache enough requests on the wireless network > with a couple programs, which you could then brute force on a desktop > pc over a few hours / days depending on your machine. > > You could do the WHOLE wep (64bit and 128bit) crack within 20-30 minutes on > my 350mghz oldschool > dell laptop. Would anyone be interested in this? > > Dealing with WPA/WPA2 is a bit different, but the key to attack can be > 'cached' for brute for on another PC later. (or the NEO if wanted) > > I would have to see if the drivers support being set in 'promiscuous' mode, > etc. > > What do you guys think? Definitely taking the freerunner into a completely > different > market, which I think would be pretty cool. > > The end result would be to have a program you run, chose a wireless network, > and then > show reports of the program, cracking success/failure, etc. > > > -bk > _______________________________________________ > Openmoko community mailing list > community@lists.openmoko.org > http://lists.openmoko.org/mailman/listinfo/community > > _______________________________________________ Openmoko community mailing list community@lists.openmoko.org http://lists.openmoko.org/mailman/listinfo/community