User Tools

Site Tools


arp-request_reinjection

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revisionBoth sides next revision
arp-request_reinjection [2007/05/25 00:03] – added alternate attack method darkaudaxarp-request_reinjection [2007/05/25 01:28] – added more detail about ARP darkaudax
Line 1: Line 1:
 ====== ARP Request Replay Attack ====== ====== ARP Request Replay Attack ======
 +
  
  
Line 5: Line 6:
  
 The classic ARP request replay attack is the most effective way to generate new initialization vectors (IVs), and works very reliably.  The program listens for an ARP packet then retransmits it back to the access point.  This, in turn, causes the access point to repeat the ARP packet with a new IV.  The program retransmits the same ARP packet over and over.  However, each ARP packet repeated by the access point has a new IVs.  It is all these new IVs which allow you to determine the WEP key. The classic ARP request replay attack is the most effective way to generate new initialization vectors (IVs), and works very reliably.  The program listens for an ARP packet then retransmits it back to the access point.  This, in turn, causes the access point to repeat the ARP packet with a new IV.  The program retransmits the same ARP packet over and over.  However, each ARP packet repeated by the access point has a new IVs.  It is all these new IVs which allow you to determine the WEP key.
 +
 +==== What is ARP? ====
  
 ARP is address resolution protocol:   A TCP/IP protocol used to convert an IP address into a physical address, such as an Ethernet address.  A host wishing to obtain a physical address broadcasts an ARP request onto the TCP/IP network. The host on the network that has the address in the request then replies with its physical hardware address. ARP is address resolution protocol:   A TCP/IP protocol used to convert an IP address into a physical address, such as an Ethernet address.  A host wishing to obtain a physical address broadcasts an ARP request onto the TCP/IP network. The host on the network that has the address in the request then replies with its physical hardware address.
 +
 +ARP is the foundation of many attacks in the aircrack-ng suite.  These links will allow you to learn more about ARP:
 +
 +   * [[http://www.pcmag.com/encyclopedia_term/0,2542,t=ARP&i=37988,00.asp|PC Magazine: Definition of ARP]]
 +   * [[http://en.wikipedia.org/wiki/Address_resolution_protocol|Wikipedia: Address Resolution Protocol]]
 +   * [[http://technet2.microsoft.com/windowsserver/en/library/7b77bb1b-5c57-408f-907f-8b474203a5331033.mspx?pf=true|Microsft Technet: Address Resolution Protocol (ARP)]]
 +
  
  
arp-request_reinjection.txt · Last modified: 2010/11/21 16:08 by sleek