Crack WEP Encryption
Of course I did this experiment in a test-environment. (on my own Accees-Point)
used equipmentThe most important thing is that your wireless card is compatible with the tools used. The other Hardware should be exchangeable.
discover the target networkKismet is a good choice to discover your target network. You will need information about the BSSID and channel later on. capture trafficThis is the part which takes most of the time. You should keep the caputring process running during the next steps.
# airodump ath0 cap 11
ath0 = interface; cap = filename(could be anyone); 11 = channel If you are running a Live CD it is highly recommanded to capture the data to another drive. When capturing to ramdisk your computer will become slower and slower, because the more data you capture the more RAM you take away of the running machine. performaing the attackWhile sniffing traffic we can try if we have already captured enough data: # aircrack -b 00:12:A9:02:FD:FD *.cap
-b = BSSID If you do not have success you should wait until enough traffic is captured. This is only a matter of time - depanding on the network load. What others don't tell youIn the test network 1GB of data was transfered, but only 350MB were actually captured by the attacker. After ~250.000-300.000 interesting packets were found the attack was successful. When enough traffic was captured the attack was done in 0.2 seconds! The capturing process took much longer. Encription used: 128bit WEP The easy wayUsually you don't have to mess around with any command line tools, just start AirSnort, select the Channel and network card driver. Now you just have to wait until enough traffic is caputed. when the process is finished the key will be presented on the same screen. additional Links
last updated 02 November 2008
|