Posts

Showing posts with the label wep

Hacking a WEP key with airodump on Ubuntu

Image
WEP key can easily be cracked with a simple combination of tools on Linux machine. The WEP cracking is made easier by the flaws in the design of the WEP encryption that makes it so vulnerable. These tools are already inbuilt in the Backtrack linux about which I posted recently. But you can install these hacking tools separately as well on any linux distro. These steps are made for an Ubuntu machine and uses Debian version which is the format for Ubuntu. Specific version for each each hack tool are available for almost all leading linux versions. The hack starts- Install aircrack-ng – on Debian Etch by: sudo apt-get install aircrack-ng Then start aircrack-ng to look for wireless networks: sudo airodump-ng eth1 Then notice the channel number of the wireless network you want to crack. Quit aircrack-ng and start it again with med specific channel number to collect packages faster: sudo airodump-ng -c 4 -w dump eth1 Then wait and let it collect about 500K IVS and the try the do the act...

Wireless Hacking tutorial using Backtrack

Wireless Hacking with backtrack 3 is easy to do , in this article I’d like to guide you in Wireless hacking with backtrack 3. This tutorial is made based on some requests by my subscribers , they’ve been familiar enough with Backtrack 3 , that’s why I made this Wireless Hacking with backtrack 3 tutorial. In order to start the wireless hacking , you need to make sure that you have met these requirements :   - Backtrack 3 or newer release - 1 wireless router - Laptop with wireless card And let the hack begins : In order to crack a WEP key you must have a large number of encrypted packets to work with. This is an unavoidable requirement if you wish to be successful. The best way to get a large number of packets is to perform an ARP request re injection attack (otherwise known as attack -3). In order to do this attack and get results there must be a client already authenticated with the AP, aor connecting to the AP. **********************************************************************...