The Following User Says Thank You to Switch_ For This Useful Post: | ||
|
2011-02-02
, 16:30
|
Posts: 179 |
Thanked: 49 times |
Joined on Nov 2008
|
#322
|
WEP
Firstly a little background information from the aircrack wiki
"A little theory first. WEP is a really crappy and old encryption techinque to secure a wireless connection. A 3-byte vector, called an Initalization Vector or IV, is prepended onto packets and its based on a pre-shared key that all the authenticated clients know... think of it as the network key you need to authenticate.
Well if its on (almost) every packet generated by the client or AP, then if we collect enough of them, like a few hundred thousand, we should be able to dramatically reduce the keyspace to check and brute force becomes a realistic proposition."
First things first, from the 'Monitor' tab enable the packet injection drivers and then monitor mode. At the moment there is no way to check if the drivers are enabled or not so if you aren't sure then just click the enable button anyway.
Next, you will need to click on the 'Access Point' tab. From here select how many seconds to run a scan for (default is 5) and click the scan button. Make sure the WEP button is highlighted to show only WEP networks. Select your desired target and click the "Start Packet Capture" button. This will load airodump in an xterm. Be sure to leave this window open until you are ready to crack.
Now you must click the "Authenticate" button to attempt to authenticate with the network, which will allow you to perform packet injection. This will launch a new xterm which will display information about your authentication request. If you see a line similar to "AID 1 :-)" then all is good. If not, try changing your mac address to the same as an already authenticated client (you can see them at the bottom of the airodump xterm). Bear in mind that changing your mac requires the stopping and starting of your interface and it WILL close your airodump window
Once authenticated, click the "Injection" button, this will launch a new xterm and start listening for ARP and ACK packets. As soon as a ARP packet is captured it SHOULD start re-injecting it at about 500pps (packets per second). At this point the number of ARP requests should start to skyrocket! If injection starts but the ARP number remains static, it means you need to authenticate with the router. Leave the authentication and injection windows open.
To check how many IVs you have successfully captured, click on the "Decryption" tab, and select your current CAP file from the list. This will be the name of the network and a number. Now click the "Decrypt" button. It will load aircrack in a new xterm and after reading the packets it will display how many IVs have been captured and attempt to crack the key. You will normally need at least 50,000 IVs in order to perform a successful decryption, so if it is much less than this then you may as well close this window.
Once you are ready to crack, press the decrypt button and if you have enough IVs, the password should be broken in seconds. At this point the aircrack xterm will close and you can view the key by selecting it from the list and clicking the "Show Key" button. If it doesn't show up, just press the "Refresh" button. (Keys are also stored in your MyDocs/FAS/keys/ directory).
If all went well then the whole process should take around 8-15 minutes.
|
2011-02-02
, 16:37
|
|
Posts: 11 |
Thanked: 0 times |
Joined on Feb 2011
@ Malaysia & Indonesia
|
#323
|
|
2011-02-02
, 17:27
|
Posts: 182 |
Thanked: 84 times |
Joined on Jul 2010
@ Jordan
|
#324
|
Sorry guys its working 100%.
If I could reproduce the problem then I could have a go at sorting it.
Is it all networks or just certain ones?
|
2011-02-02
, 18:39
|
Posts: 1,463 |
Thanked: 1,916 times |
Joined on Feb 2008
@ Edmonton, AB
|
#325
|
i remember getting a -20 infraction just by requesting this app a few months back. and getting all sorts of edited tags like "idiot post etc.". what a turn out? LOL
|
2011-02-02
, 18:42
|
|
Posts: 330 |
Thanked: 483 times |
Joined on Dec 2010
@ Norwich, UK
|
#326
|
mine cannot find the package john through xterm!
PS i typed apt-get install john
any ideas?
|
2011-02-03
, 07:52
|
|
Posts: 601 |
Thanked: 549 times |
Joined on Mar 2010
@ Redditch, UK
|
#327
|
|
2011-02-03
, 12:32
|
Posts: 25 |
Thanked: 1 time |
Joined on Aug 2010
|
#328
|
|
2011-02-03
, 13:17
|
Posts: 25 |
Thanked: 1 time |
Joined on Aug 2010
|
#330
|
Tags |
aircrack, aircrack-ng, epicfacepalm, pen testing, rtfm dude! |
|
---<|| Alt + F4 for GOD MODE ||>---
---<|| Deviant Art Linky Linky ||>---
Last edited by Switch_; 2011-02-03 at 12:36.