THEORY BEHIND WEP CRACKING
to watch WEP cracking video click on the link: https://youtu.be/moMi9AzxnSI
WEP is an old encryption , but its still used in some networks , there
fore we will explain how to break it.
It uses an algorithm called RC4 where each packet is encrypted at the
AP and is then decrypted at the client , WEP insures that each packet
has a unique key stream by using a random 24-bit Initializing Vector
(IV) , this IV is contained in the packets as plain text. The short IV
means in a busy network we can collect more than two packets with
the same IV, then we can use aircrack-ng to determine the key stream
and the WEP key using statistical attacks.
Conclusion: The more IV's that we collect the more likely for us to
crack the key.
fore we will explain how to break it.
It uses an algorithm called RC4 where each packet is encrypted at the
AP and is then decrypted at the client , WEP insures that each packet
has a unique key stream by using a random 24-bit Initializing Vector
(IV) , this IV is contained in the packets as plain text. The short IV
means in a busy network we can collect more than two packets with
the same IV, then we can use aircrack-ng to determine the key stream
and the WEP key using statistical attacks.
Conclusion: The more IV's that we collect the more likely for us to
crack the key.
WEP Cracking:Basic Case
so all we need to do is to run airodump-ng to log all traffic from the target
network.
> airodump-ng --channel [channel] --bssid [bssid] --write [file-name] [interface]
Ex: airodump-ng –channel 6 –bssid 11:22:33:44:55:66 –write name wlan0mon
At the same time we shall use aircrack-ng to try and crack the key using the
capture file created by the above command.
> aircrack-ng [file-name]
Ex: aircrack-ng name-01.cap
Keep both programs running at the same time and aircrack-ng will be able todtermine the key when the number of IV's un out-01.cap is enough.
network.
> airodump-ng --channel [channel] --bssid [bssid] --write [file-name] [interface]
Ex: airodump-ng –channel 6 –bssid 11:22:33:44:55:66 –write name wlan0mon
At the same time we shall use aircrack-ng to try and crack the key using the
capture file created by the above command.
> aircrack-ng [file-name]
Ex: aircrack-ng name-01.cap
Keep both programs running at the same time and aircrack-ng will be able todtermine the key when the number of IV's un out-01.cap is enough.
Good information Bro keep up
ReplyDeleteAlso visit my site
Techncyber.com
thanks brother
Delete