User Tools

Site Tools


how_to_crack_wep_via_a_wireless_client

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Next revision Both sides next revision
how_to_crack_wep_via_a_wireless_client [2008/04/22 16:15]
netrolller3d Proper workaround for the double-dash wikitext problem, enhance compat info of fragmentation attack, and emphasize that "ath0" is a variable (to stop newbies with WL cards @ "wlan0" from typing "ath0").
how_to_crack_wep_via_a_wireless_client [2009/09/11 21:12]
darkaudax fixed typo
Line 1: Line 1:
 ====== Tutorial: ​ How to crack WEP via a wireless client ? ====== ====== Tutorial: ​ How to crack WEP via a wireless client ? ======
-Version: 1.16 August 252007 \\+Version: 1.17 September 112009 \\
 By: darkAudax \\ By: darkAudax \\
 \\ \\
Line 7: Line 7:
  
 ===== Introduction ===== ===== Introduction =====
-There has been a lot of discussion over time of how to use a wireless client workstation to generate packets to crack   WEP instead of the wireless access point itself. This tutorial describes four approaches with examples of how to do this. The examples provided are from from real working equipment, not theory. ​ Each was used in real life and successfully cracked the WEP keys.+There has been a lot of discussion over time of how to use a wireless client workstation to generate packets to crack   WEP instead of the wireless access point itself. This tutorial describes four approaches with examples of how to do this. The examples provided are from real working equipment, not theory. ​ Each was used in real life and successfully cracked the WEP keys.
  
 The basic idea is to have the wireless client workstation generate data packets with IVs which we can use to crack the WEP key. Normally we have the access point itself generate the data packets with IVs.  So why would you need to leverage a wireless client workstation instead of the access point? Here are just a few of the reasons: The basic idea is to have the wireless client workstation generate data packets with IVs which we can use to crack the WEP key. Normally we have the access point itself generate the data packets with IVs.  So why would you need to leverage a wireless client workstation instead of the access point? Here are just a few of the reasons:
Line 61: Line 61:
 Operating System: Linux \\ Operating System: Linux \\
 MAC address: 00:​09:​5B:​EC:​EE:​F2 MAC address: 00:​09:​5B:​EC:​EE:​F2
 +
  
  
Line 356: Line 357:
   * It supports Broadcom chipsets only with the b43/​b43legacy drivers, not bcm43xx.   * It supports Broadcom chipsets only with the b43/​b43legacy drivers, not bcm43xx.
   * Mac80211-based drivers (b43, rt2x00, etc) currently require a patch for the mac80211 stack.   * Mac80211-based drivers (b43, rt2x00, etc) currently require a patch for the mac80211 stack.
-  * Keep an eye on the forms for more compatibility information.+  * Keep an eye on the forums ​for more compatibility information.
  
 Here is the command to run: Here is the command to run:
how_to_crack_wep_via_a_wireless_client.txt ยท Last modified: 2018/03/11 20:17 by mister_x