So in order to hack WEP, we are going to use airodump-ng and with airodump-ng we are going to use aircrack-ng. So airodump-ng will be capturing the packets and what aircrack-ng is going to do is that aircrack-ng will be trying to read those IVs.
Aircrack-ng will be trying to read that bit random number I told you about in the previous video, and it is going to run statistical attacks on it and then when it finds two packets with the same IV it will crack the WEP key for us. So airodump-ng is very easy. We just need to put channel and then bssid and then write the output.
Using aircrack-ng is even more easy. We just type in aircrack-ng and after that we are going to write the file name. The file name is similar to the file name in airodump-ng. It will actually be the file in which we are capturing the packets. So it is going to get more clear when we actually do it. So now I am going to say airodump-ng wlan0mon to check the Wi-Fi available for us and here is our test network. After that we specify the channel, and the channel is 1, and then we give it the output file name.
So we can say here output-wep-crack or you can give it any name you want and after that we are going to say wlan0mon. So, it is very easy. Airodump-ng —bssid of the Wi-Fi or network we are trying to hack or crack the key, then channel and then the name of output file and then the interface monitor mode it is running on.
So it is very easy. We say aircrack-ng and after that we have to put the file name. So we say output -wep-crack and then the capture file. So, we have this file available. We can say aircrack-ng then after that we can copy it or we can just type in output and then capture file. So it is saying that it failed to find two packets with the similar IV or similar random number so it is going to try next on 5, IVs. And you remember in the last videos we said that data is the number of useful packets we captured.
So now it can get more clear to you that these are the packets with different kind of IVs. Running a spoofed mac id and pounding the network for say seconds to spread it out a bit , is anyone going to notice that host A seemed excessively curious about host B at the ARP level, not at the IP firewall level?
I doubt that anyone still using WEP is going to be collecting, much less looking at, this sort of stuff. Well that is and old news but it come vorse to the people just change the system and go up to internet. In the UK there are many home networks with no encryption and many that use WEP as its the next choice on the list after none.
I am so sorry. I will do my best to secure this notoriously vulnerable technology, but I can make no guarantee that hackers will not exploit my network in the future.
I agree it is a useful letter but, as we now know that any wireless security is at best a delay, he may as well leave it switched on and not lie. And I gots to have my Mario Kart!
Neglecting this can result in liability for misuse of the access point, including illegal downloads tracked down by IP, hacking etc. Theres a video tutorial on using the whoppix live cd to crack wep in 10 minutes here you will need to download and install the techsmith codec..
I am all you've ever slain. I am tears in your eyes. I am grief , I am lies. Post by Ramius » PM Additionally, the tools on Backtrack and the old auditor are quite nice and have excellent tutorials and support. Post by catch » AM A decent tutorial on the subject.
0コメント