IBM had a tool that did what you want, but I don't know if they released it publically. They had it running on an Ipaq with linux. You'll have to search for it though. Airsnort is strictly for cracking the WEP key. You use the capture program to grab enough interesting packets (usually have to sniff from 100MB to a gig to get enough), and then you run the crack on the data you have collected. If you've collected enough, it will crack the key in about 1 second. If you don't have enough, you can change the breadth to guess, but this can take a LONG time. Jay -----Original Message----- From: Nate Carlson [mailto:natecars at real-time.com] Sent: Wednesday, September 12, 2001 3:21 PM To: tclug-list at mn-linux.org Subject: Re: [TCLUG] 802.11b: Sniffing for ESSID On Wed, 12 Sep 2001, Ben Lutgens wrote: > airsort? airsnort doesn't appear to do crap on unencrypted networks.. basically, from what i've gleaned by running it, it just saves the "interesting" packets, which can be later decrypted. if there's no encryption, there's no interesting packets. -- Nate Carlson <natecars at real-time.com> | Phone : (952)943-8700 http://www.real-time.com | Fax : (952)943-8500 _______________________________________________ tclug-list mailing list tclug-list at mn-linux.org https://mailman.mn-linux.org/mailman/listinfo/tclug-list