easside-ng
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
easside-ng [2009/05/03 20:51] – Fixed broken URL darkaudax | easside-ng [2009/09/05 23:27] – wiki-files.aircrack-ng.org become download.aircrack-ng.org/wiki-files mister_x | ||
---|---|---|---|
Line 16: | Line 16: | ||
Easside-ng is an auto-magic tool which allows you to communicate via an WEP-encrypted access point (AP) without knowing the WEP key. It first identifies a network, then proceeds to associate with it, obtain PRGA (pseudo random generation algorithm) xor data, determine the network IP scheme and then setup a TAP interface so that you can communicate with the AP without requiring the WEP key. All this is done without your intervention. | Easside-ng is an auto-magic tool which allows you to communicate via an WEP-encrypted access point (AP) without knowing the WEP key. It first identifies a network, then proceeds to associate with it, obtain PRGA (pseudo random generation algorithm) xor data, determine the network IP scheme and then setup a TAP interface so that you can communicate with the AP without requiring the WEP key. All this is done without your intervention. | ||
- | There are two primary papers "The Fragmentation Attack in Practice" | + | There are two primary papers "The Fragmentation Attack in Practice" |
In order to access the wireless network without knowing the WEP key is done by having the AP itself decrypt the packets. | In order to access the wireless network without knowing the WEP key is done by having the AP itself decrypt the packets. | ||
Line 97: | Line 97: | ||
Basically, the program obtains a small amount of keying material from the packet then attempts to send packets with known content to the access point (AP). If the packet is successfully echoed back by the AP then a larger amount of keying information can be obtained from the returned packet. | Basically, the program obtains a small amount of keying material from the packet then attempts to send packets with known content to the access point (AP). If the packet is successfully echoed back by the AP then a larger amount of keying information can be obtained from the returned packet. | ||
- | The original paper, [[http:// | + | The original paper, [[http:// |
==== Linear Keystream Expansion Technique ==== | ==== Linear Keystream Expansion Technique ==== |
easside-ng.txt · Last modified: 2013/03/19 18:21 by jano