Crack WEP in 5
Minutes !
Method for Cracking WEP In 5 min. or in short term Breaking WiFi
Security
Here is how it can be done :
1 . Run Kismet to find your target network . Get the SSID and the channel .
2 . Run Airodump and start capturing data .
3 . With Aireplay , start replaying a packet on the target network . (You can find a good packet by looking at the BSSID MAC on Kismet and comparing it to the captured packet's BSSID MAC)
4 . Watch as Airodumpgoes crazy with new IVs . Thanks to Aireplay
5 . Stop Airodump when you have about 1000-5000 IVs (Depends on password)
6 . Run Aircrack on the captured file .
7 . You should see the WEP key infront of you now .
LIST OF PROGRAMS USED
Here is how it can be done :
1 . Run Kismet to find your target network . Get the SSID and the channel .
2 . Run Airodump and start capturing data .
3 . With Aireplay , start replaying a packet on the target network . (You can find a good packet by looking at the BSSID MAC on Kismet and comparing it to the captured packet's BSSID MAC)
4 . Watch as Airodumpgoes crazy with new IVs . Thanks to Aireplay
5 . Stop Airodump when you have about 1000-5000 IVs (Depends on password)
6 . Run Aircrack on the captured file .
7 . You should see the WEP key infront of you now .
LIST OF PROGRAMS USED
·
Kismet : It is an 802.11 layer2 wireless network detector , sniffer and
intrusion detection system . It is designed for Linux . You can download it
at HERE . A Windows
version can be downloaded at HERE
·
Aircrack (includes Airodump , Aireplay , Aircrack , and optional Airdecap for
decrypting WEP / WPA capture file )
·
Aircrack is the 802.11 WEP and WPA-PSK keys cracking program that can recover
this keys once enough encrypted packets have been captured with Airodump
·
Airdecap is used to decrypt WEP/WPA capture files .
·
Airmon can be used to configure the wireless card .
·
Aireplay is used to inject frames .
·
Airodump is used for packet capturing of raw 802.11 frames
and is particularly suitable for collecting WEP IVs (initialization vectors)
for the intend of using them with aircrack-ng .
No comments:
Post a Comment