how_to_crack_wep_via_a_wireless_client
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
how_to_crack_wep_via_a_wireless_client [2007/08/25 22:16] – Clarified the desired packet in scenario two. darkaudax | how_to_crack_wep_via_a_wireless_client [2008/05/19 19:26] – Fyx a mispeelinng. netrolller3d | ||
---|---|---|---|
Line 4: | Line 4: | ||
\\ | \\ | ||
File linked to this tutorial: [[http:// | File linked to this tutorial: [[http:// | ||
+ | |||
===== Introduction ===== | ===== Introduction ===== | ||
Line 17: | Line 18: | ||
* You are within range of a client but not the access point itself | * You are within range of a client but not the access point itself | ||
- | I would like to acknowledge and thank the aircrack-ng | + | I would like to acknowledge and thank the [[http:// |
Please send me any constructive feedback, positive or negative. | Please send me any constructive feedback, positive or negative. | ||
===== Solution ===== | ===== Solution ===== | ||
+ | |||
====Assumptions used in this tutorial==== | ====Assumptions used in this tutorial==== | ||
Line 30: | Line 32: | ||
* You are physically close enough to the client to send packets to them and receive packets from them. | * You are physically close enough to the client to send packets to them and receive packets from them. | ||
* You have Wireshark installed and working. | * You have Wireshark installed and working. | ||
- | * You are using the aircrack-ng stable version of 0.9. This is very important since there is a bug in 0.6.2 aireplay-ng which switches -k and -l IP addresses. | + | * You are using the aircrack-ng stable version of 0.9 or the development version of 1.0. This is very important since there is a bug in 0.6.2 aireplay-ng which switches -k and -l IP addresses. |
- | + | ||
- | In the examples, the option " | + | |
====Equipment used==== | ====Equipment used==== | ||
Line 48: | Line 48: | ||
Operating System: Linux \\ | Operating System: Linux \\ | ||
MAC address: does not matter | MAC address: does not matter | ||
+ | Wireless interface used: ath0 | ||
===Ethernet wired Workstation=== | ===Ethernet wired Workstation=== | ||
Line 60: | Line 61: | ||
Operating System: Linux \\ | Operating System: Linux \\ | ||
MAC address: 00: | MAC address: 00: | ||
+ | |||
Line 138: | Line 140: | ||
airodump-ng --channel 9 --bssid 00: | airodump-ng --channel 9 --bssid 00: | ||
- | Be sure NOT to use the "- -ivs" option since you will later use the PTW method to crack the WEP key. This is " | + | Be sure NOT to use the "-'''' |
Now use interactive replay in a second separate session: | Now use interactive replay in a second separate session: | ||
Line 353: | Line 355: | ||
* Atheros chipsets: | * Atheros chipsets: | ||
* It sometimes does not work smoothly with ralink. | * It sometimes does not work smoothly with ralink. | ||
- | * Keep an eye on the forms for more compatibility information. | + | |
+ | * Mac80211-based drivers (b43, rt2x00, etc) currently require a patch for the mac80211 stack. | ||
+ | | ||
Here is the command to run: | Here is the command to run: |
how_to_crack_wep_via_a_wireless_client.txt · Last modified: 2018/03/11 20:17 by mister_x