Version 0.1.3 of Weplab

Release Notes: This release fixes a bug with those WEP keys which have a 0xFF byte value, a bug that made Weplab show the wrong BSSID with --analyze, and a problem with --ascii in bruteforce attack. There is now a manual page. Minor bugs were fixed related to console printed messages.

Other releases

  •  18 Jul 2005 14:03

Release Notes: A bug with small packets (like arp) has been fixed. The minimun size has been decreased to 20 bytes. This release works like a charm with an arp replay attack. It prints the right ASCII password when a WEP key is cracked using the dictionary mode.

  •  06 Mar 2005 03:31

Release Notes: A bug in bruteforge.c was fixed, and a new way to coordinate multiple process cracking was implemented. Another bug in bruteforge.c was fixed to allow --ascii to go up to 0x7F. Support was added for --alpha (only letters) and --alnum (letters and numbers) in the bruteforce attack. wlan0 is now the default interface for capturing packets. Pressing "q" now quits sniffing and flushes the pcap file. Help for command line parameters was simplified. Some divide by 0 bugs were fixed. The --wordfile option was added to make it possible to launch the dictionary based attack without using John the Ripper to generate words.

  •  09 Dec 2004 20:32

Release Notes: This release fixes a bug with those WEP keys which have a 0xFF byte value, a bug that made Weplab show the wrong BSSID with --analyze, and a problem with --ascii in bruteforce attack. There is now a manual page. Minor bugs were fixed related to console printed messages.

  •  11 Sep 2004 05:36

Release Notes: The default options for statistical attacks have changed and are now [ -s 3 --perc 50 ]. The commandline options are now more relaxed and robust. A PRISM_HEADER datalink has been added for capture packets. This release has been tested and works fine with John The Ripper 1.6.

  •  09 Sep 2004 09:02

Release Notes: BSSID is automatically detected and selected if it is not specified with --bssid. The "analyze" switch (-a) now shows all packets per BSSID. Big endian issues fixed. Small fixes were made for the Windows platform. A small bug was fixed with rc4 decryption. A small change was made to Korek inverse attack.

Screenshot

Project Spotlight

Suricata

A network IDS and IPS engine.

Screenshot

Project Spotlight

nassh-relay

A relay server for the Secure Shell Chromium plugin.