User Tools

Site Tools


flowchart

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Last revision Both sides next revision
flowchart [2008/05/09 23:35]
netrolller3d Oops.
flowchart [2009/08/14 19:11]
mister_x use dokuwiki internal links
Line 1: Line 1:
 ======Simple Wep Cracking with a flowchart====== ======Simple Wep Cracking with a flowchart======
  
-Last update: ​Aug 202007 \\+Last update: ​May 92008 \\
 Author: matts Author: matts
  
Line 35: Line 35:
 See the following URL's for compatibility information:​ See the following URL's for compatibility information:​
  
-^Cards|http://​aircrack-ng.org/​doku.php?​id=compatible_cards| +^Cards|[[compatible_cards]]
-^Drivers|http://​aircrack-ng.org/​doku.php?​id=compatibility_drivers| +^Drivers|[[compatibility_drivers]]
-^Patching|http://​aircrack-ng.org/​doku.php?​id=install_drivers|+^Patching|[[install_drivers]]|
  
 =====Section 3:  Associating to the AP===== =====Section 3:  Associating to the AP=====
Line 52: Line 52:
 =====Section 6:  Generate an XOR file (chopcop or fragmentation attack)===== =====Section 6:  Generate an XOR file (chopcop or fragmentation attack)=====
 The point of cracking is to generate data.  You can generate data in Section 4, but sometimes there are no clients connected to wifi, but the AP is still sending out data.  In this case, you will want to capture the data that the AP is sending out, and use it to determine a valid XOR keystream (basically a file which allows you to create a packet with out knowing the key).   The two attacks for this are "​fragmentation"​ and "​chop-chop"​. ​ Fragmentation is quickest, but you have to have a good connection to the AP (be close to the AP), and it doesn'​t work with all cards. ​ Chop-chop usually works with all cards, but it doesn'​t always work on every AP. The point of cracking is to generate data.  You can generate data in Section 4, but sometimes there are no clients connected to wifi, but the AP is still sending out data.  In this case, you will want to capture the data that the AP is sending out, and use it to determine a valid XOR keystream (basically a file which allows you to create a packet with out knowing the key).   The two attacks for this are "​fragmentation"​ and "​chop-chop"​. ​ Fragmentation is quickest, but you have to have a good connection to the AP (be close to the AP), and it doesn'​t work with all cards. ​ Chop-chop usually works with all cards, but it doesn'​t always work on every AP.
 +
  
 =====Section 7:  Frag / Chop-chop failed===== =====Section 7:  Frag / Chop-chop failed=====
Line 62: Line 63:
   * Most AP's are ok with 30-50 packets per second (-x 30 or -x 50), if they are the type that ignore you for sending packets too fast.   * Most AP's are ok with 30-50 packets per second (-x 30 or -x 50), if they are the type that ignore you for sending packets too fast.
   * The AP may ignore you if your MAC address is not the same as the packet'​s MAC address, so you can spoof your mac address to suit the packet.   * The AP may ignore you if your MAC address is not the same as the packet'​s MAC address, so you can spoof your mac address to suit the packet.
 +  * Some APs don't discard corrupted packets correctly. Such APs are not vulnerable to chopchop.
  
 =====Section 8:  Success! ​ XOR Keystream file generated.===== =====Section 8:  Success! ​ XOR Keystream file generated.=====
flowchart.txt · Last modified: 2012/04/02 14:33 by wims