1 --- aircrack.c.o 2005-02-14 01:10:25.000000000 +0100
2 +++ aircrack.c 2005-02-14 01:11:00.000000000 +0100
5 " usage: aircrack [options] <pcap file> <pcap file> ...\n"
7 +" -S : silent - usefull for embedded devices\n"
8 " -d <start> : debug - specify beginning of the key\n"
9 " -f <fudge> : bruteforce fudge factor (default: 2)\n"
10 " -m <maddr> : MAC address to filter usable packets\n"
13 /* command-line parameters */
15 +int silent = 0; /* Silent, just display wep key if found */
16 int debug_lvl = 0; /* # of keybytes fixed */
17 int macfilter = 0; /* BSSID check flag */
18 int stability = 0; /* unstable attacks on */
21 wepkey[B] = wpoll[B][depth[B]].index;
29 if( B == 4 && weplen == 13 )
33 /* we have a valid key */
39 printf( " \33[31;1mKEY FOUND! [ " );
41 for( i = 0; i < weplen; i++ )
42 printf( "%02X", wepkey[i] );
44 printf( " ]\33[0m\n\n" );
47 + printf( "KEY FOUND! [ " );
48 + for( i = 0; i < weplen; i++ )
49 + printf( "%02X", wepkey[i] );
59 - int option = getopt( argc, argv, "d:f:m:n:p:s:" );
60 + int option = getopt( argc, argv, "Sd:f:m:n:p:s:" );
62 if( option < 0 ) break;
75 @@ -1072,7 +1087,11 @@
76 tm_start = time( NULL );
77 tm_prev = time( NULL );
87 return( do_wep_crack( 0 ) );