Reported by hirte on 1 Jan 2007 15:22 UTC
Create a new file format, which contains all recovered keystreams. Build a tool (or include in aireplay as attack -6?), that'll generate keystreams and fill the database. Support for this db has to be written for packetforge-ng, airtun-ng and aireplay-ng (for all tools, which are using a keystream). These keystreams can be used in a way that we evade WIDS. Another example is airtun-ng, which could en-/decrypt (with a more or less complete keyspace) and thus using a network without cracking the key.
该提问来源于开源项目:aircrack-ng/aircrack-ng