 |
AirSnort Homepage |
 |
News
- 01/15/04 - Posted my libnids-1.18 patch to enable recognition of
DLT_PRISM_HEADER (the data link type used by prism cards). This is a better
fix to allow dsniffing in monitor mode as DLT_IEEE802_11 has been supported
since version 1.16. Download patch and build libnids-1.18, then rebuild a
stock version of dsniff to make use of it. You no longer need to use the
dsniff below. Get the libnids patch here: libnids-1.18-prism-patch.diff.
- 12/09/03 - GUI updated to gtk+-2.2
- Old
news
Introduction
AirSnort is a wireless LAN (WLAN) tool which recovers
encryption keys. AirSnort operates by passively monitoring transmissions,
computing the encryption key when enough packets have been gathered.
802.11b, using the Wired Equivalent Protocol (WEP), is crippled with numerous
security flaws. Most damning of these is the weakness described in " Weaknesses in the Key
Scheduling Algorithm of RC4 " by Scott Fluhrer, Itsik Mantin and Adi Shamir.
Adam Stubblefield was the
first to implement this attack, but he has not made his software public.
AirSnort, along with WEPCrack, which was released
about the same time as AirSnort, are the first publicly available implementaions
of this attack.
AirSnort requires approximately 5-10 million encrypted packets to be
gathered. Once enough packets have been gathered, AirSnort can guess the
encryption password in under a second.
AirSnort 0.2.3a Requirements
AirSnort runs under linux, and reqires that
your wireless nic be capable of rf monitor mode, and that it pass monitor mode
packets up via the PF_PACKET interface. Cards known to do this are:
- Cisco Aironet
- Prism2 based cards using wlan-ng drivers
- Orinoco cards and clones using patched orinoco_cs
drivers
To compile AirSnort, do the following:
Orinoco Notes: The latest patches seem to
smooth things out for all versions of Orinoco firmware. Please make sure
you are using the latest patches. If you do not see a patch for your
version of pcmcia-cs, then PLEASE determine what version of the orinoco drivers
are included with your version of pcmcia-cs and get the appropriate orinoco-0.XX
patches. To do this look in pcmcia-cs-X.Y.Z/wireless/orinoco_cs.c which
will list the version number in the first couple of lines.
Download
Anonymous CVS is at the CVSROOT
:pserver:anonymous@cvs.airsnort.sourceforge.net:/cvsroot/airsnort . For
more information, view our SourceForge page.
Download the tarballs from Sourceforge
Apple iBook Info
See Erik Winkler's iBook page for more
information.
Contact Us
Email Snax with
questions, comments, suggestions and patches. Jeremy and Blake are semi-retired
from the project.
Old News
- 08/08/03 - Posted my dsniff patches to allow dsniffing in monitor
mode. Get it here dsniff-2.3-monitor-patch.tar.gz.
- 08/07/03 - Ported the orinoco patch to the orinoco-0.13d and 0.13e
drivers. Get it from the orinoco info page.
- 02/22/03 - Monitor mode patch for orinoco-0.13b is available on orinoco info page.
- 02/19/03 - Windows
information Some background information on the windows porting effort.
Worth a read if you are going to attempt to build Airsnort on Windows.
- 02/15/03 - Airsnort on Windows? Its
working in alpha, but requires some effort to install. If patching the orinoco
drivers is too much for you then this is probably not for you either. I hope
to have more shortly. Most of the code is already in CVS, but the installation
instruction instructions are not available yet.
- 02/07/03 - Ritchie@tipsybottle.com has a nice HOWTO
on RedHat 8.0 + Orinoco + Kismet here
Much of the info is applicable to airsnort as well.
- 09/25/02 - The problems with v8.10 firmware may have been solved
thanks to the troubleshooting efforts of Ian Goldberg and Pat Swieskowski. Try
the patch for pcmcia-cs-3.2.1 available on the orinoco info page. This
patch should also apply to pcmcia-cs-3.2.0 though I have not tested it.
- 08/31/02 - Pat Swieskowski has also posted some info on using
Airsnort on an Apple iBook. See the page - http://www.swieskowski.net/code/wifi.php
- 08/27/02 - Erik Winkler has posted some info on using Airsnort on
an Apple iBook. See the page - http://www.macunix.net:443/ibook.html
- 08/17/02 - Released Airsnort-0.2.1b which fixes bug in gencases and
decrypt.
- 08/16/02 - Ported the orinoco patch to the pcmcia-cs-3.2.0 drivers.
Get it from the orinoco
info page. David Gibson has declared the orinoco-0.12 series a failed
experiment and I have removed the patch for 0.12 drivers.
- 06/20/02 - Ported the orinoco patch to the 0.12 drivers. Get it
from the orinoco info
page.
- 06/08/02 - Got off my butt and updated the orinoco driver
capabilities. Posted a patch to the orinoco-0.11b drivers to enable monitor
mode AND allow setting of your own MAC address via ifconfig. Get it from the
orinoco info page.
- 06/07/02 - Released Airsnort-0.2.1a, primarily a maintenance
release. This release fixes a bug in weak IV reporting and removes gnome
dependencies. The decrypt tool is more like a dictionary based cracker now,
but still has a way to go.
- 06/02/02 - Successful downgrade for Orinoco v8.10 firmware users.
See the Orinoco
information page for details.
- 05/03/02 - The project finally has a logo! It was derived with the
permission of Marty Roesch over at the Snort
project which you should certainly check out if you haven't already.
- 05/01/02 - Airsnort 0.2.1 released - requires libpcap. Limited
support for Cisco cards. Changes here
- 04/17/02 - Updated the orinoco patches to correct a problem when
receiving beacon packets (and perhaps others?) Thanks to jonp@chem.... !!
- 04/12/02 - Just released - Decrypt is a program to
decrypt data packets in pcap style capture files.
- 04/10/02 - The faq has been updated
- 03/19/02 - New Patches available. See the new Orinoco info page.
Also see the updated faq for
answers to questions about monitor mode, promiscuous mode, PF_NETLINK, and
PF_PACKET.
- 03/14/02 - patch-0.2.0-1
for Airsnort 2.0 posted. orinocoSniff.c updated to fix problems with
SIOCIWFIRSTPRIV
- 03/07/02 - New Orinoco patch for
pcmcia-3.1.33/orinoco-0.09b
- 02/28/02 - AirSnort 2.0 released. Read about changes.
- 08/23/01 - Frequently
Asked Questions we wrote in response to a bunch of our emails
- 08/20/01 - We got written up by Wired News.