9:40 PM
Today, we commonly find wireless networks around us. Most wireless
networks are encrypted using WEP or WPA encryption methods. I was
recently looking around my site and realized that I had not ever posted a
how-to on easily cracking WEP.
WEP, short for wired equivalent privacy, is one of several encryption
schemes used to secure wireless networks. At the time of conception,
WEP was believed to be secure. However, a security flaw was found in the
IV headers of data packets that makes it possible to crack WEP if
enough IV headers are collected. The attacks shown in this tutorial take
advantage of this weakness in the initialization vectors of wireless
packets to crack WEP. Easyly Hack wifi wep To Kali Linux.....
When enough packets have been collected, the key for the WEP-secured
network can be cracked by using wifi-hacking tools, such as aircrack-ng.
Kali Linux includes aircrack-ng among one of its top 10 security tools
for testing vulnerability of computer networks. In this post, I’ll
demonstrate how a WEP key can be easily found using the aircrack-ng
tools in Kali Linux. However, a problem may arise when there are
multiple keys in use Just One Kali
You need Kali LINUX and
basic knowledge of Linux. Kali Linux is a Debian-based Linux
distribution for testing network security. Kali Linux currently supports
PC’
Then, boot your computer with the Kali Linux DVD. Hopefully, you’ll
be automatically presented with a nice and dark GUI screen of GNOME DESXTOPE
Crack WEP Security
First off, I will say that I use Ra-Link USB Wifi Cards. They work
great, have long range, and you can use them in Kali right out of the
box. There are many options when it comes to plugging in external
antennas and arrays for Alfa Wifi Adapters. It is my highest
recommendation to click on the picture to the right and pick yourself up
an Alfa Wifi USB adapter!
Open a Terminal window and type ifconfig to see if your wifi card is running. It will have a designation such as wlan0, wlan1, etc…
If you have no wlan, you may need to type the command for loading a
driver for your wireless network card or USB WiFi adapter. You may have
to put required firmware in /lib/firmware before trying to load the
driver because Kali Linux lacks firmware for some drivers. For example,
to load b43 driver, type:
If the WiFi driver is working, then the network traffic in the top
right corner of the screen will show available wireless networks when
you click on it.
Name of the wireless network (ESSID)
MAC address of the access point (BSSID)
Channel of the wireless network
MAC address of wireless clients
In Kismet, WEP-secured networks are marked with W under the C column of network list.
Type the following commands to put your wireless device wlan0 in monitoring mode.
Change the MAC address of your wireless network card. This may or may
not work depending on the hardware used. In the example, the text in
red is the new MAC address for your wireless card. Usually, this MAC is
the actual MAC address of an existing wireless client associated with
the target network. With the fake MAC, we’re going to trick the access
point with one of the following attacks.
Etc
Start airodump-ng which will sniff wireless traffic of the target
network and collect good IV’s (initialization vectors, part of WEP
encryption data). The logfile will be used later to find the WEP key.
The number after -c option is the channel of the wireless network to
listen to. The screen will show wireless networks and associated
clients, if any, with a set of numbers increasing. Don’t stop
airodump-ng or close the terminal yet. Just leave the terminal open.
In the following attacks, we are going to use aireplay-ng.
Aireplay-ng is a handy tool for generating more wireless traffic in
order to collect sufficient amount of good IV’s. It does so by injecting
or replaying captured packets to fool the access point into giving us
what we need. Open another tab in GNOME Terminal. This attack will
associate the target wireless client with the access point.
The -e option specifies the network name, the -a option
specifies the MAC address of the AP, and the -h option specifies the
MAC address of the wireless client. You can use macchanger to view and
change your MAC address, for example, macchanger -s wlan0. Then, you can associate your wireless adapter when there are no clients connected to the wireless network in the first place.
The -b option specifies the MAC address of the AP and -h specifies
MAC address of the associated client. Let it run and airodump-ng will
pick up traffic. If no client is connected, we can create one by fake
authentication described above.
This attack generates traffic by asking the access point to resend
data packets. Open another tab in GNOME Terminal and start the
interactive packet replay attack.
The -b option specifies the MAC address of the AP and -h specifies MAC address of the associated client.
After enough packets have been collected and saved, aircrack-ng can be used to crack the WEP key.
Replace the filename with your log file that was previously generated
with airodump-ng. Also, specify the access point’s MAC address with -b option. The -n option specifies whether the WEP strength is 64-bit or 128-bit. The -a 1 option specifies that we’re cracking WEP.
If you still can’t crack WEP with tons of IV’s, increase the fudge factor with -f N option (N>=2). It’ll take much longer to crack but you’ll have a better chance at success.
Kali Linux Need TO Hack Wifi Wep
Kali Linux on need vmware Software
0 comments:
Post a Comment