fragmentation
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
fragmentation [2007/05/25 00:00] – add alternate attack methods darkaudax | fragmentation [2009/09/05 23:32] (current) – wiki-files.aircrack-ng.org become download.aircrack-ng.org/wiki-files mister_x | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== Fragmentation Attack ====== | ====== Fragmentation Attack ====== | ||
- | |||
- | |||
- | |||
===== Description ===== | ===== Description ===== | ||
- | This attack, when successful, can obtain 1500 bytes of PRGA (pseudo random generation algorithm). This attack does not recover the WEP key itself, but merely obtains the PRGA. The PRGA can then be used to generate packets with [[packetforge-ng]] which are in turn used for various injection attacks. | + | This attack, when successful, can obtain 1500 bytes of PRGA (pseudo random generation algorithm). This attack does not recover the WEP key itself, but merely obtains the PRGA. The PRGA can then be used to generate packets with [[packetforge-ng]] which are in turn used for various injection attacks. |
- | Basically, the program obtains a small amount of keying material from the packet then attempts to send ARP and/or LLC packets with known content to the access point (AP). If the packet is successfully echoed back by the AP then a larger amount of keying information can be obtained from the returned packet. | + | Basically, the program obtains a small amount of keying material from the packet then attempts to send ARP and/or LLC packets with known content to the access point (AP). If the packet is successfully echoed back by the AP then a larger amount of keying information can be obtained from the returned packet. |
- | The original paper by Andrea Bittau at http://www.toorcon.org/2005/ | + | The original paper, [[http://darkircop.org/bittau-wep.pdf|The Fragmentation Attack in Practice]], by Andrea Bittau |
===== Usage ===== | ===== Usage ===== | ||
Line 96: | Line 93: | ||
===== Usage Troubleshooting ===== | ===== Usage Troubleshooting ===== | ||
+ | |||
+ | ==== General ===== | ||
* Make sure your card can successfully inject. | * Make sure your card can successfully inject. | ||
Line 107: | Line 106: | ||
* [[interactive_packet_replay# | * [[interactive_packet_replay# | ||
+ | |||
+ | ==== "Not enough acks, repeating" | ||
+ | |||
+ | If you receive a message similar to: | ||
+ | |||
+ | | ||
+ | | ||
+ | | ||
+ | | ||
+ | | ||
+ | | ||
+ | |||
+ | Possible reasons are: | ||
+ | |||
+ | * Too close or too far from the Access Point | ||
+ | * The driver is problematic. | ||
fragmentation.txt · Last modified: 2009/09/05 23:32 by mister_x