User Tools

Site Tools


how_to_crack_wep_with_no_clients

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
how_to_crack_wep_with_no_clients [2010/11/21 09:19] – typos sleekhow_to_crack_wep_with_no_clients [2018/03/11 20:15] (current) – [Introduction] Removed link to trac mister_x
Line 1: Line 1:
 ====== Tutorial: How to crack WEP with no wireless clients ====== ====== Tutorial: How to crack WEP with no wireless clients ======
-Version: 1.15 September 262009 \\+Version: 1.16 August 28201 \\
 By: darkAudax \\ By: darkAudax \\
 Video: [[http://video.aircrack-ng.org/noclient/|http://video.aircrack-ng.org/noclient/]] Video: [[http://video.aircrack-ng.org/noclient/|http://video.aircrack-ng.org/noclient/]]
Line 10: Line 10:
  
 It is recommended that you experiment with your home wireless access point to get familiar with these ideas and techniques. If you do not own a particular access point, please remember to get permission from the owner prior to playing with it. It is recommended that you experiment with your home wireless access point to get familiar with these ideas and techniques. If you do not own a particular access point, please remember to get permission from the owner prior to playing with it.
- 
-I would like to acknowledge and thank the [[http://trac.aircrack-ng.org/wiki/Team|Aircrack-ng team]] for producing such a great robust tool.  
  
 Please send me any constructive feedback, positive or negative. Additional troubleshooting ideas and tips are especially welcome. Please send me any constructive feedback, positive or negative. Additional troubleshooting ideas and tips are especially welcome.
Line 231: Line 229:
            Use this packet ? y            Use this packet ? y
  
-When a packet from the access point arrives, enter "y" to proceed.  You may need to try a few to be successful.+When a packet from the access point arrives, enter "y" to proceed.  You may need to try a few different packets from the AP to be successful.  These packets have ""FromDS: 1".
  
 When successful, the system responds: When successful, the system responds:
Line 379: Line 377:
   *-k 255.255.255.255 is the destination IP (most APs respond to 255.255.255.255)   *-k 255.255.255.255 is the destination IP (most APs respond to 255.255.255.255)
   *-l 255.255.255.255 is the source IP (most APs respond to 255.255.255.255)   *-l 255.255.255.255 is the source IP (most APs respond to 255.255.255.255)
-  *-y fragment-0203-180343.xor is file to read the PRGA from+  *-y fragment-0203-180343.xor is file to read the PRGA from (NOTE: Change the file name to the actual file name out in step 4 above)
   *-w arp-request is name of file to write the arp packet to   *-w arp-request is name of file to write the arp packet to
  
how_to_crack_wep_with_no_clients.1290327560.txt.gz · Last modified: 2010/11/21 09:19 by sleek