Ignore:
Timestamp:
Dec 6, 2008, 12:25:02 PM (13 years ago)
Author:
schroeder
Message:

Spelling corretions, removed unnecessary code, one modification in quickwatch area of attack wep plugin

Location:
trunk/CrypPlugins/WEPAttacks/WEPAttacks
Files:
3 edited

Legend:

Unmodified
Added
Removed
  • trunk/CrypPlugins/WEPAttacks/WEPAttacks/DetailedDescription/Description.xaml

    r4 r124  
    1414        <Span xml:lang="de-de">This plugin simulates three attacks against the secret key, which is used within the</Span>
    1515        <Span FontStyle="Italic" xml:lang="de-de">Wired Equivalent Privacy</Span>
    16         <Span xml:lang="de-de">(WEP) protocol for encryption and decryption (for a short intoduction into this WEP protocol, please have a
     16        <Span xml:lang="de-de">(WEP) protocol for encryption and decryption (for a short introduction into this WEP protocol, please have a
    1717            look at the description tab of the "WEP protocol" plugin). The three attacks are the</Span>
    1818        <misc:DescriptionHyperlink NavigateUri="http://www.drizzle.com/~aboba/IEEE/rc4_ksaproc.pdf">"FMS attack"</misc:DescriptionHyperlink>
     
    2121        <Span xml:lang="de-de">and the</Span>
    2222        <misc:DescriptionHyperlink NavigateUri="http://eprint.iacr.org/2007/120.pdf">"PTW attack"</misc:DescriptionHyperlink>
    23         <Span xml:lang="de-de">: three different attacks with different fundamentals and different probabilities of success.</Span>
     23        <Span xml:lang="de-de">: Three different attacks with different fundamentals and different probabilities of success.</Span>
    2424    </Paragraph>
    2525
    2626    <Paragraph Margin="0,0,0,0" TextAlignment="Left" FontFamily="Verdana" FontSize="13.3333333333333" />
    2727    <Paragraph Margin="0,0,0,0" TextAlignment="Left" FontFamily="Verdana" FontSize="13.3333333333333">
    28         <Span xml:lang="de-de">You can choose the attack either in the</Span>
     28        <Span xml:lang="de-de">You can choose the attack</Span>
     29    </Paragraph>
     30   
     31    <Paragraph Margin="0,0,0,0" TextAlignment="Left" FontFamily="Verdana" FontSize="13.3333333333333" />
     32    <Paragraph Margin="0,0,0,0" TextAlignment="Left" FontFamily="Verdana" FontSize="13.3333333333333">
     33        <Span xml:lang="de-de">- either in the</Span>
    2934        <Span FontStyle="Italic" xml:lang="de-de">Algorithm Settings</Span>
    3035        <Span xml:lang="de-de">(within the drop down menu "Kind of attack"):</Span>
     
    4045    <Paragraph Margin="0,0,0,0" TextAlignment="Left" FontFamily="Verdana" FontSize="13.3333333333333" />
    4146    <Paragraph Margin="0,0,0,0" TextAlignment="Left" FontFamily="Verdana" FontSize="13.3333333333333">
    42         <Span xml:lang="de-de">or by right clicking on the plugin in the editor:
     47        <Span xml:lang="de-de">- or by right clicking on the plugin in the editor:
    4348        </Span>
    4449    </Paragraph>
     
    8388            ("Used packets"). The "FMS attack" and also the "KoreK attack" uses only some special encrypted data packets.
    8489            The "FMS attack" searches for special Initialisation Vectors (IV), the "KoreK attack" has some additional
    85             conditions, which decide wheather the packet is used for analysis or not. Within the "PTW attack", every packet
     90            conditions, which decide whether the packet is used for analysis or not. Within the "PTW attack", every packet
    8691            is used for the analysis.
    8792        </Span>
     
    9196    <Paragraph Margin="0,0,0,0" TextAlignment="Left" FontFamily="Verdana" FontSize="13.3333333333333">
    9297        <Span xml:lang="de-de">The text box within the "QuickwatchPresentation" area shows you the current state of the
    93             analysis. The first column is the number of the keybyte (beginning at "00"), and the following columns are
    94             the potential keybytes with their corresponding ranking in brackets. If you choose to run a "PTW attack", the
     98            analysis. The first column is the number of the key byte (beginning at "00"), and the following columns are
     99            the potential key bytes with their corresponding ranking in brackets. If you choose to run a "PTW attack", the
    95100            presentation within this text box is a bit different. There are no columns any more, but one line, in which
    96             the currently most voted value for each keybyte is shown. So, the first value represents the potential first
    97             key byte, the second value the potential second keybyte and so on.
     101            the currently most voted value for each key byte is shown. So, the first value represents the potential first
     102            key byte, the second value the potential second key byte and so on.
    98103        </Span>
    99104    </Paragraph>
     
    101106    <Paragraph Margin="0,0,0,0" TextAlignment="Left" FontFamily="Verdana" FontSize="13.3333333333333" />
    102107    <Paragraph Margin="0,0,0,0" TextAlignment="Left" FontFamily="Verdana" FontSize="13.3333333333333">
    103         <Span xml:lang="de-de">The keybytes are allways shown in hexadecimal notation. If the key has been reconstructed
    104             successfuly, this key will be presented to you in the normal ASCII notation, too.
     108        <Span xml:lang="de-de">The key bytes are always shown in hexadecimal notation. If the key has been reconstructed
     109            successfully, this key will be presented to you in the normal ASCII notation, too.
    105110        </Span>
    106111    </Paragraph>
     
    118123        <Span xml:lang="de-de">The packets, which are created from the "Internet frame generator" plugin (IFG),
    119124            are delivered to the "WEP protocol" plugin, which encrypts the packets according to the WEP protocol.
    120             This encrypted packets are then delivered to this "Attacks on the WEP protocol" plugin, which
     125            These encrypted packets are then delivered to this "Attacks on the WEP protocol" plugin, which
    121126            simulates the selected attack against the key, which has been used for encryption.
    122127        </Span>
     
    161166    <Paragraph Margin="0,0,0,0" TextAlignment="Left" FontFamily="Verdana" FontSize="13.3333333333333">
    162167        <Span xml:lang="de-de">So this workflow is a loop, which doesn't stop until the key has been recovered
    163             successful.
     168            successfully.
    164169        </Span>
    165170    </Paragraph>
  • trunk/CrypPlugins/WEPAttacks/WEPAttacks/WEPAttacks.cs

    r4 r124  
    143143        #endregion
    144144
     145        #region Public interface
     146
    145147        public WEPAttacks()
    146148        {
     
    153155            if (OnPluginStatusChanged != null) OnPluginStatusChanged(this, args);
    154156        }
     157
     158        #endregion
    155159
    156160        #region Private methods
     
    255259                    GuiLogMessage("Got " + tempList.Count.ToString("#,#", CultureInfo.InstalledUICulture) + " packets.", NotificationLevel.Info);
    256260                }
     261                presentation.setNumberOfSniffedPackages(tempList.Count + counter);
    257262            }
    258263        }
     
    670675                if (packetUsed) { usedPacktesCounter++; }
    671676                counter++;
    672                 presentation.setNumberOfSniffedPackages(counter);
     677                //presentation.setNumberOfSniffedPackages(counter);
    673678                presentation.setUsedIVs(usedPacktesCounter);
    674679                if (packetUsed && (counter > 300.000))
     
    10211026                if (usedPacket) { usedPacktesCounter++; }
    10221027                counter++;
    1023                 presentation.setNumberOfSniffedPackages(counter);
     1028                //presentation.setNumberOfSniffedPackages(counter);
    10241029                presentation.setUsedIVs(usedPacktesCounter);
    10251030                if (usedPacket && (counter > 300000))
     
    11991204                counter++;
    12001205                usedPacktesCounter++;
    1201                 presentation.setNumberOfSniffedPackages(counter);
     1206                //presentation.setNumberOfSniffedPackages(counter);
    12021207                presentation.setUsedIVs(usedPacktesCounter);
    12031208                if (counter > 20000)
  • trunk/CrypPlugins/WEPAttacks/WEPAttacks/WEPAttacksSettings.cs

    r4 r124  
    2121        private bool fileOrNot = false;
    2222        private bool hasChanges = false;
     23        private string dataSource = string.Empty;
    2324
    2425        /// <summary>
     
    5758        /// true => source is data, false => source is another plugin (NOT "File Input"!!!)
    5859        /// </summary>
    59         /*[ContextMenu("Data comes from file",
    60             "Does the data come from file or not?",
    61             2,
    62             DisplayLevel.Beginner,
    63             ContextMenuControlType.CheckBox,
    64             new int[] { 1, 2 },
    65             new string[] { "Data comes from file" })]*/
    6660        [TaskPane("Data comes from file",
    6761            "Does the data come from file or not?",
     
    8983        }
    9084
    91         /*/// <summary>
    92         /// 0 = get from other plugin, 1 = load from file
     85        /// <summary>
     86        /// Indicates whether data comes from file or from another plugin (most propably the "Internet frame generator" plugin).
     87        /// Needed to react if attack was not successful.
    9388        /// </summary>
    94         [ContextMenu("Input",
    95             "Do you want to load packets from a file or get them from other plugins?",
    96             2,
    97             DisplayLevel.Beginner,
    98             ContextMenuControlType.ComboBox,
    99             new int[] { 1, 2 },
    100             "Get from other plugin",
    101             "Load from file")]
    102         [TaskPane("Input",
    103             "Dou you want to load packets from a file or get them from other plugins?",
    104             "",
    105             2,
     89         
     90        // Radiobuttons are not implemented yet, so I coment them out (11-25-2008)
     91
     92        /*[TaskPane("Dealing with end of given data",
     93            "Dealing with end of given data",
     94            "groupRadiobutton",
     95            3,
    10696            false,
    10797            DisplayLevel.Beginner,
    108             ControlType.ComboBox,
    109             new String[] { "Get from other plugin", "Load from file" })]
    110         public int InputMode
     98            ControlType.RadioButton,
     99            new string[]{"Data comes from file (finish, if attack is not successful)",
     100                "Data comes from IFG (wait for further package, if attack is not successful yet)"})]
     101        public string DataSource
    111102        {
    112             get { return this.inputMode; }
     103            get
     104            {
     105                return this.dataSource;
     106            }
    113107            set
    114108            {
    115                 if ((int)value != inputMode)
     109                if ((string)value != dataSource)
    116110                {
    117111                    hasChanges = true;
    118112                }
    119                 this.inputMode = (int)value;
    120                 if (this.inputMode == 0)
    121                 {
    122                     LoadFileName = string.Empty;
    123                 }
    124                 OnPropertyChanged("InputMode");
     113                this.dataSource = (string)value;
     114                OnPropertyChanged("DataSource");
    125115            }
    126         }
    127 
    128         [TaskPane("Load FileName",
    129             "File to load data from.",
    130             null,
    131             3,
    132             false,
    133             DisplayLevel.Beginner,
    134             ControlType.OpenFileDialog,
    135             "All Files (*.*)|*.*")]
    136         public string LoadFileName
    137         {
    138             get { return loadFileName; }
    139             set
    140             {
    141                 loadFileName = value;
    142                 OnPropertyChanged("LoadFileName");
    143             }
    144         }
    145 
    146         /*[TaskPane("Close file",
    147             "Close file",
    148             null,
    149             4,
    150             false,
    151             DisplayLevel.Beginner,
    152             ControlType.Button)]
    153         public void CloseFile()
    154         {
    155             LoadFileName = string.Empty;
    156116        }*/
    157117
Note: See TracChangeset for help on using the changeset viewer.