Oct 9, 2008

B43-legacy with kernel 2.6.26 for Aircrack



I've been testing my bcm4318 which is a broadcom wireless chipset since kernel 2.6.22 on my ubuntu machine. As far as I know, before kernel 2.6.24 all the broadcom chipset need bcm43xx driver to be working on all linux machine. Some of user might prefer using windows driver with ndiswrapper installed for more speed.

So lately i've been testing my bcm4318 with kernel 2.6.26 by using b43-legacy driver. So far it's working well with injection all set up pretty good. I've manage to crack WEP in just 2-5 minutes of injection.

I'm really eager to try it on the new Ubuntu's Intrepid Ibex with it's latest unstable kernel 2.6.27. Hope the latest kernel wont need a major work to make b43 the best chipset to use with aircrack.

What's new on aircrack-ng?

Well I've been testing and reviewing about aircrack for the past few months, and I'm still waiting for the leatest features of tools the developement team currently working on. It's easside-ng and wesside-ng. Well basiccally wesside-ng is an automated script which will help user to quickly crack a WEP by using logics and injections.

Wesside-ng is an auto-magic tool which incorporates a number of techniques to seamlessly obtain a WEP key in minutes. It first identifies a network, then proceeds to associate with it, obtain PRGA (pseudo random generation algorithm) xor data, determine the network IP scheme, reinject ARP requests and finally determine the WEP key. All this is done without your intervention.

Taken from aircrack-ng.org
While easside-ng has a different function but will bring a lot more benefits for it's user in order to use protected Access Point. easside-ng won't crack any WEP password, but it will give you access to WEP without you need to know the password.

Easside-ng is an auto-magic tool which allows you to communicate via an WEP-encrypted access point (AP) without knowing the WEP key. It first identifies a network, then proceeds to associate with it, obtain PRGA (pseudo random generation algorithm) xor data, determine the network IP scheme and then setup a TAP interface so that you can communicate with the AP without requiring the WEP key. All this is done without your intervention.

Taken from aircrack-ng.org
I hope that aircrack will keep improving and bring much fun for linux user to experimenting with their own wireless for security aspects.


Thank you for your unbelievable support on Negative Zero - Permission to read and write blog for nearly 4 years. Don't forget to like Negative Zero on Facebook.
Blogirific.com Blog Directory





Post(s) you might like to read :

1 comment:

  1. salam bro, nak minta tukar link blog aku ke http://khuzaimi.blogspot.com

    ReplyDelete