English Deutsch Français Italiano Español Português 繁體中文 Bahasa Indonesia Tiếng Việt ภาษาไทย
All categories

I heard that wep can br cracked i have a linux live distro with all the wep cracking tools i have my own wep enabled network i have 1 pc 2 laptops and i would like to try and crack the wep on my netgear router but i do not know how.
It is quite complicated i am not familiar with linux.

Can someone show me a guide or point me in the right direction.

I will be penetrating my own wireless network which is total legal so please no lectures about how its illegal etc ,its onlt illegal if you crack someone elses wep which i am not.

2007-11-02 05:55:10 · 2 answers · asked by Anonymous in Computers & Internet Security

Actualy its 192.160.0.1

I enables wep to try crack wep.I usualy use better security plus theres no one around here for miles and no one ever comes to this small town in the uk so no risk of having my wep cracked while i try crack it.

2007-11-02 06:22:26 · update #1

2 answers

Use a dictionary attack to test the security of your WEP key.

While widely publicized for its ability to crack a WEP key in real time by attacking weaknesses in the implementation, AirSnort requires a potentially large amount of data to be gathered before the attack is successful. AirSnort also comes with a largely unknown utility that will perform a dictionary attack on a relatively tiny sampling of network traffic.

Using the aptly named decrypt utility, you can attempt to decrypt a WEP stream by trying a list of potential candidates from a word list. This attack can be carried out in a matter of minutes, rather than the hours that would be required to collect the large traffic samples needed to interpolate a WEP key.

To use the decrypt utility, you first need a packet dump from a utility that can capture raw 802.11 frames (such as Kismet [Hack #31]). You will also need a list of suitable candidates, namely words that are either 5 or 13 characters long (for 40-bit or 104-bit WEP respectively). Invoke the utility like this:

# decrypt -f /usr/dict/words -m 00:02:2D:27:D9:22 -e encrypted.dump -d [RETURN]
out.dump
Found key: Hex - 61:6c:6f:68:61, ASCII - "aloha"
Notice that you also need to specify the BSSID of the network you wish to attempt to decrypt. In this case, the BSSID is the same as the MAC address of the AP, but can be set to virtually anything. You can obtain this field from the Info pane inside Kismet when capturing the data [Hack #31]. If successful, the decrypt utility displays the WEP key, decrypts the entire stream (specified by the -e switch), and saves it to a file of your choice (specified by the -d switch).

This output file is suitable for import into any standard packet-analysis tool, such as tcpdump ([Hack #37]) or Etherereal [Hack #39].

Of course, this attack succeeds only if the WEP key actually appears in your list of words to try. Unix password crackers have developed utilities over the years that will not only try words from the dictionary, but will try common (and even unusual) variations on these words until a match is found. The use of these tools is left as an exercise to whatever demented individuals find it worth their while to do so.

Again, the point of this hack isn't to encourage you to go around breaking into people's networks, but to stress the importance of strong encryption and proper network configuration. It is just plain foolish to expect WEP to answer all of your security needs when tools like AirSnort so easily demonstrate its inherent weaknesses.

You can download AirSnort from http://airsnort.shmoo.com/. There is also a wealth of information there about passive monitoring, WEP implementations, and wireless security in general.

2007-11-02 05:59:42 · answer #1 · answered by system32_msoobe 3 · 0 0

I am a little curious why you would use WEP security at all.
WPA, and WPA-2 are much more secure and are offered on almost all Router Utility Software.
And can be acccessed by using the standard,192.168.1.1 in the browser.
Don

2007-11-02 13:15:20 · answer #2 · answered by Don M 7 · 0 0

fedest.com, questions and answers