User Tools

Site Tools


how_to_crack_wep_with_no_clients

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
how_to_crack_wep_with_no_clients [2010/08/29 19:44]
mister_x Fixed channel/frequency graph link
how_to_crack_wep_with_no_clients [2018/03/11 20:15] (current)
mister_x [Introduction] Removed link to trac
Line 1: Line 1:
 ====== Tutorial: How to crack WEP with no wireless clients ====== ====== Tutorial: How to crack WEP with no wireless clients ======
-Version: 1.15 September 262009 \\+Version: 1.16 August 28201 \\
 By: darkAudax \\ By: darkAudax \\
 Video: [[http://​video.aircrack-ng.org/​noclient/​|http://​video.aircrack-ng.org/​noclient/​]] Video: [[http://​video.aircrack-ng.org/​noclient/​|http://​video.aircrack-ng.org/​noclient/​]]
Line 10: Line 10:
  
 It is recommended that you experiment with your home wireless access point to get familiar with these ideas and techniques. If you do not own a particular access point, please remember to get permission from the owner prior to playing with it. It is recommended that you experiment with your home wireless access point to get familiar with these ideas and techniques. If you do not own a particular access point, please remember to get permission from the owner prior to playing with it.
- 
-I would like to acknowledge and thank the [[http://​trac.aircrack-ng.org/​wiki/​Team|Aircrack-ng team]] for producing such a great robust tool.  
  
 Please send me any constructive feedback, positive or negative. Additional troubleshooting ideas and tips are especially welcome. Please send me any constructive feedback, positive or negative. Additional troubleshooting ideas and tips are especially welcome.
Line 231: Line 229:
            Use this packet ? y            Use this packet ? y
  
-When a packet from the access point arrives, enter "​y"​ to proceed. ​ You may need to try a few to be successful.+When a packet from the access point arrives, enter "​y"​ to proceed. ​ You may need to try a few different packets from the AP to be successful.  These packets have ""​FromDS:​ 1".
  
-When successful, the system ​reponds:+When successful, the system ​responds:
  
    ​Saving chosen packet in replay_src-0203-180328.cap    ​Saving chosen packet in replay_src-0203-180328.cap
Line 379: Line 377:
   *-k 255.255.255.255 is the destination IP (most APs respond to 255.255.255.255)   *-k 255.255.255.255 is the destination IP (most APs respond to 255.255.255.255)
   *-l 255.255.255.255 is the source IP (most APs respond to 255.255.255.255)   *-l 255.255.255.255 is the source IP (most APs respond to 255.255.255.255)
-  *-y fragment-0203-180343.xor is file to read the PRGA from+  *-y fragment-0203-180343.xor is file to read the PRGA from (NOTE: Change the file name to the actual file name out in step 4 above)
   *-w arp-request is name of file to write the arp packet to   *-w arp-request is name of file to write the arp packet to
  
Line 450: Line 448:
         Use this packet ? y         Use this packet ? y
  
-Enter "​y"​ to use this packet. ​ The system responds by showing how many packets it is injecting and reminds you to start airodumump ​if it has not already been started:+Enter "​y"​ to use this packet. ​ The system responds by showing how many packets it is injecting and reminds you to start airodump-ng ​if it has not already been started:
  
    ​Saving chosen packet in replay_src-0204-104917.cap    ​Saving chosen packet in replay_src-0204-104917.cap
how_to_crack_wep_with_no_clients.1283103881.txt.gz ยท Last modified: 2010/08/29 19:44 by mister_x