To crack WEP on OS X, you must have the ability to discover KisMAC and Aircrack-ng. KisMAC can reinject data packets to generate data communication, but it lacks the advanced encryption PTW attack of Aircrack-ng. This means you need to configure KisMAC to capture all communication packets to the pcap file (KisMAC | Preferences (Preferences) | Driver | Keep Everything (save all data )), then pass the pcap to Aircrack-ng for cracking. In the following example, all data packets are saved to the/Dumplogs/curr. pcap file.
Obtaining the Aircrack-ng compiled version on OS X is equivalent to obtaining it on Linux. Download and compile the source code of the latest version :,,
Now that we have compiled Aircrack-ng, We will scan Kismet and then select Network | Re-inject Packets (Re-inject data Packets ). Once KisMAC sees an ARP packet that can be replayed, you should see the content as shown in.
Focus on the data packet counters running in the background. If the injection operation is in progress, you should be able to see that the number is increasing rapidly. Once you have completed the injection, stop the Aircrack-ng command from the command line:
(:/Dumplogs) $ aircrack-ng./curr. pcap-0