flowchart
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | Next revisionBoth sides next revision | ||
flowchart [2008/05/09 23:35] – Again, chopchop and fragment got mixed up. netrolller3d | flowchart [2008/05/09 23:35] – Oops. netrolller3d | ||
---|---|---|---|
Line 47: | Line 47: | ||
=====Section 5: Is the AP sending out ANY data?===== | =====Section 5: Is the AP sending out ANY data?===== | ||
In order to crack anything, the AP has to send out at least 1 packet. | In order to crack anything, the AP has to send out at least 1 packet. | ||
+ | |||
=====Section 6: Generate an XOR file (chopcop or fragmentation attack)===== | =====Section 6: Generate an XOR file (chopcop or fragmentation attack)===== | ||
- | The point of cracking is to generate data. You can generate data in Section 4, but sometimes there are no clients connected to wifi, but the AP is still sending out data. In this case, you will want to capture the data that the AP is sending out, and use it to determine a valid XOR keystream (basically a file which allows you to create a packet with out knowing the key). The two attacks for this are " | + | The point of cracking is to generate data. You can generate data in Section 4, but sometimes there are no clients connected to wifi, but the AP is still sending out data. In this case, you will want to capture the data that the AP is sending out, and use it to determine a valid XOR keystream (basically a file which allows you to create a packet with out knowing the key). The two attacks for this are " |
- | | + | |
=====Section 7: Frag / Chop-chop failed===== | =====Section 7: Frag / Chop-chop failed===== |
flowchart.txt · Last modified: 2012/04/02 14:33 by wims