flowchart
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionLast revisionBoth sides next revision | ||
flowchart [2008/05/09 23:30] – "Patching" link. netrolller3d | flowchart [2009/08/14 19:11] – use dokuwiki internal links mister_x | ||
---|---|---|---|
Line 1: | Line 1: | ||
======Simple Wep Cracking with a flowchart====== | ======Simple Wep Cracking with a flowchart====== | ||
- | Last update: | + | Last update: |
Author: matts | Author: matts | ||
Line 35: | Line 35: | ||
See the following URL's for compatibility information: | See the following URL's for compatibility information: | ||
- | ^Cards|http:// | + | ^Cards|[[compatible_cards]]| |
- | ^Drivers|http:// | + | ^Drivers|[[compatibility_drivers]]| |
- | ^Patching|http:// | + | ^Patching|[[install_drivers]]| |
=====Section 3: Associating to the AP===== | =====Section 3: Associating to the AP===== | ||
Line 47: | Line 47: | ||
=====Section 5: Is the AP sending out ANY data?===== | =====Section 5: Is the AP sending out ANY data?===== | ||
In order to crack anything, the AP has to send out at least 1 packet. | In order to crack anything, the AP has to send out at least 1 packet. | ||
+ | |||
+ | |||
=====Section 6: Generate an XOR file (chopcop or fragmentation attack)===== | =====Section 6: Generate an XOR file (chopcop or fragmentation attack)===== | ||
- | The point of cracking is to generate data. You can generate data in Section 4, but sometimes there are no clients connected to wifi, but the AP is still sending out data. In this case, you will want to capture the data that the AP is sending out, and use it to determine a valid XOR keystream (basically a file which allows you to create a packet with out knowing the key). The two attacks for this are " | + | The point of cracking is to generate data. You can generate data in Section 4, but sometimes there are no clients connected to wifi, but the AP is still sending out data. In this case, you will want to capture the data that the AP is sending out, and use it to determine a valid XOR keystream (basically a file which allows you to create a packet with out knowing the key). The two attacks for this are " |
=====Section 7: Frag / Chop-chop failed===== | =====Section 7: Frag / Chop-chop failed===== | ||
Line 60: | Line 63: | ||
* Most AP's are ok with 30-50 packets per second (-x 30 or -x 50), if they are the type that ignore you for sending packets too fast. | * Most AP's are ok with 30-50 packets per second (-x 30 or -x 50), if they are the type that ignore you for sending packets too fast. | ||
* The AP may ignore you if your MAC address is not the same as the packet' | * The AP may ignore you if your MAC address is not the same as the packet' | ||
+ | * Some APs don't discard corrupted packets correctly. Such APs are not vulnerable to chopchop. | ||
=====Section 8: Success! | =====Section 8: Success! | ||
Line 70: | Line 74: | ||
This will open up any file starting with " | This will open up any file starting with " | ||
+ | |||
=====Section 10: Attack wont work at this time===== | =====Section 10: Attack wont work at this time===== | ||
Line 77: | Line 82: | ||
* Turn off MAC filtering and WPA/WPA2. | * Turn off MAC filtering and WPA/WPA2. | ||
* The AP isn't sending out any data, you will have to wait, or manually generate some data on your network. | * The AP isn't sending out any data, you will have to wait, or manually generate some data on your network. | ||
- | * Frag/ | + | * Frag/ |
=====EOF===== | =====EOF===== | ||
I hope you have found this tutorial helpful. | I hope you have found this tutorial helpful. | ||
flowchart.txt · Last modified: 2012/04/02 14:33 by wims