newbie_guide
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
newbie_guide [2010/06/17 15:45] – Fixed typo darkaudax | newbie_guide [2018/10/08 04:09] – Updated links mister_x | ||
---|---|---|---|
Line 4: | Line 4: | ||
Last updated: May 09, 2008\\ | Last updated: May 09, 2008\\ | ||
\\ | \\ | ||
- | This tutorial will give you the basics to get started using the aircrack-ng suite. | + | This tutorial will give you the basics to get started using the aircrack-ng suite. |
Although it does not cover all the steps from start to finish like this tutorial, the [[simple_wep_crack|Simple WEP Crack]] tutorial covers the actual aircrack-ng steps in much more detail. | Although it does not cover all the steps from start to finish like this tutorial, the [[simple_wep_crack|Simple WEP Crack]] tutorial covers the actual aircrack-ng steps in much more detail. | ||
Line 17: | Line 17: | ||
To determine to which category your card belongs to, see [[compatibility_drivers|hardware compatibility page]]. Read [[compatible_cards|Tutorial: | To determine to which category your card belongs to, see [[compatibility_drivers|hardware compatibility page]]. Read [[compatible_cards|Tutorial: | ||
- | First, you need to know which chipset is used in your wireless card and which driver you need for it. You will have determined this using the information in the previous paragraph. | + | First, you need to know which chipset is used in your wireless card and which driver you need for it. You will have determined this using the information in the previous paragraph. |
As I own a Ralink USB device, I am providing the steps to get it working with Aircrack-ng. | As I own a Ralink USB device, I am providing the steps to get it working with Aircrack-ng. | ||
Line 26: | Line 26: | ||
===== RaLink USB rt2570 Setup guide ===== | ===== RaLink USB rt2570 Setup guide ===== | ||
- | If you own a rt2570 USB device (like D-Link DWL-G122 rev. B1 or Linksys WUSB54G v4) you should use the drivers from http:// | + | If you own a rt2570 USB device (like D-Link DWL-G122 rev. B1 or Linksys WUSB54G v4) you should use the drivers from [[https:// |
Lets unpack, compile and install the drivers: | Lets unpack, compile and install the drivers: | ||
Line 45: | Line 45: | ||
==== Source ==== | ==== Source ==== | ||
- | Get the latest copy of aircrack-ng from the homepage: http://www.aircrack-ng.org | + | Get the latest copy of aircrack-ng from the [[main|homepage]]. |
The following commands would have to be changed if you use a newer version of the software. | The following commands would have to be changed if you use a newer version of the software. | ||
Unpacking, compiling, installing: | Unpacking, compiling, installing: | ||
- | tar xfz aircrack-ng-1.0-rc1.tar.gz | + | tar xfz aircrack-ng-1.4.tar.gz |
- | cd aircrack-ng-1.0-rc1 | + | cd aircrack-ng-1.4 |
+ | autoreconf -i | ||
+ | ./configure --with-experimental | ||
make | make | ||
make install | make install | ||
Line 137: | Line 139: | ||
If airodump-ng could connect to the WLAN device, you'll see a screen like this: | If airodump-ng could connect to the WLAN device, you'll see a screen like this: | ||
- | {{http:// | + | {{https:// |
[[airodump-ng]] hops from channel to channel and shows all access points it can receive beacons from. Channels 1 to 14 are used for 802.11b and g (in US, they only are allowed to use 1 to 11; 1 to 13 in Europe with some special cases; 1-14 in Japan). Channels between 36 and 149 are used for 802.11a. The current channel is shown in the top left corner. | [[airodump-ng]] hops from channel to channel and shows all access points it can receive beacons from. Channels 1 to 14 are used for 802.11b and g (in US, they only are allowed to use 1 to 11; 1 to 13 in Europe with some special cases; 1-14 in Japan). Channels between 36 and 149 are used for 802.11a. The current channel is shown in the top left corner. | ||
Line 159: | Line 161: | ||
^ STATION | ^ STATION | ||
^ PWR | Signal strength. Some drivers don't report it | | ^ PWR | Signal strength. Some drivers don't report it | | ||
- | ^ Packets | + | ^ Packets |
^ Probes | ^ Probes | ||
Line 188: | Line 190: | ||
For more information about [[aircrack-ng]] parameters, description of the output and usage see the [[aircrack-ng|manual]]. | For more information about [[aircrack-ng]] parameters, description of the output and usage see the [[aircrack-ng|manual]]. | ||
- | The number of IVs you need to crack a key is not fixed. This is because some IVs are weaker and leak more information about the key than others. Usually these weak IVs are randomly mixed in between the stonger | + | The number of IVs you need to crack a key is not fixed. This is because some IVs are weaker and leak more information about the key than others. Usually these weak IVs are randomly mixed in between the stronger |
- | There are some more advanced APs out there that use an algorithm to filter out weak IVs. The result is either that you can't get more than " | + | There are some more advanced APs out there that use an algorithm to filter out weak IVs. The result is either that you can't get more than " |
====== Active attacks ====== | ====== Active attacks ====== | ||
===== Injection support ===== | ===== Injection support ===== | ||
- | Most devices don't support injection - at least not without patched drivers. Some only support certain attacks. Take a look at the [[compatibility_drivers|compatibility page]], column aireplay. | + | Most devices don't support injection - at least not without patched drivers. Some only support certain attacks. Take a look at the [[compatibility_drivers|compatibility page]], column aireplay. |
The first step is to make sure packet injection really works with your card and driver. The easiest way to test it is the [[injection_test|injection test]] attack. | The first step is to make sure packet injection really works with your card and driver. The easiest way to test it is the [[injection_test|injection test]] attack. | ||
Line 226: | Line 228: | ||
==== The idea ==== | ==== The idea ==== | ||
- | [[http:// | + | [[https:// |
sends back an answer. Because WEP does not protect against replay, you can sniff a packet, send it out again and again and it is still valid. | sends back an answer. Because WEP does not protect against replay, you can sniff a packet, send it out again and again and it is still valid. | ||
So you just have to capture and replay an ARP-request targeted at the AP to create lots of traffic (and sniff IVs). | So you just have to capture and replay an ARP-request targeted at the AP to create lots of traffic (and sniff IVs). | ||
Line 273: | Line 275: | ||
====== Further tools and information ====== | ====== Further tools and information ====== | ||
- | [[http:// | + | [[https:// |
newbie_guide.txt · Last modified: 2018/11/21 23:31 by mister_x