User Tools

Site Tools


ipw2200_generic

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Last revision Both sides next revision
ipw2200_generic [2007/10/28 22:52]
mister_x typo
ipw2200_generic [2009/05/04 00:12]
mister_x Update links to forum
Line 8: Line 8:
    - More detailed explaination about what we are doing on each step    - More detailed explaination about what we are doing on each step
    - upgrade airo tools from the livecd.    - upgrade airo tools from the livecd.
- 
- 
- 
- 
- 
- 
- 
- 
- 
  
 ===== Introduction ===== ===== Introduction =====
  
-This document is based in this [[http://tinyshell.be/​aircrackng/​forum/​index.php?​topic=2077.0|post]] you can find in the [[http://tinyshell.be/​aircrackng/​forum/​index.php|forums]].+This document is based in this [[http://forum.aircrack-ng.org/​index.php?​topic=2077.0|post]] you can find in the [[http://forum.aircrack-ng.org/​index.php|forums]].
  
 When I started using the aircrack-ng tools I did not have the  When I started using the aircrack-ng tools I did not have the 
Line 44: Line 35:
 documents recommend to start [[http://​en.wikipedia.org/​wiki/​Wikipedia:​Featured_article_candidates/​X_Window_core_protocol|Xwindow]] and open then various xterminals. documents recommend to start [[http://​en.wikipedia.org/​wiki/​Wikipedia:​Featured_article_candidates/​X_Window_core_protocol|Xwindow]] and open then various xterminals.
 There is another option: [[http://​en.wikipedia.org/​wiki/​GNU_Screen|screen]]. There is another option: [[http://​en.wikipedia.org/​wiki/​GNU_Screen|screen]].
- 
- 
- 
- 
- 
  
 ===== Verify that our ipw2200 card is recognized by the OS (Linux) ===== ===== Verify that our ipw2200 card is recognized by the OS (Linux) =====
Line 89: Line 75:
  
 Ok, so we have verified that we have an ipw2200 card and that Linux can talk to it. Ok, so we have verified that we have an ipw2200 card and that Linux can talk to it.
- 
- 
  
 ===== List available networks =====  ===== List available networks ===== 
Line 101: Line 85:
 === NOTE: === === NOTE: ===
 I am assuming that linux mapped your wireless card under eth1. Most likely you have an ethernet card under eth0. I am assuming that linux mapped your wireless card under eth1. Most likely you have an ethernet card under eth0.
- 
- 
  
 ===== Change the MAC address of our card ===== ===== Change the MAC address of our card =====
Line 109: Line 91:
  
        # ifconfig eth1 up hw ether 00:​11:​22:​33:​44:​55        # ifconfig eth1 up hw ether 00:​11:​22:​33:​44:​55
- 
- 
- 
- 
  
 ===== Configure the wireless parameters ===== ===== Configure the wireless parameters =====
Line 123: Line 101:
  
 ESSID is the name of the wireless network of our target AP. Channel is the wireless channel. ESSID is the name of the wireless network of our target AP. Channel is the wireless channel.
- 
- 
- 
  
 ===== Collect data with airodump-ng ===== ===== Collect data with airodump-ng =====
Line 137: Line 112:
  
 As we said before, if you are running the latest version of airodump-ng,​ rtap0 will be created for you automatically in case you didn't before. As we said before, if you are running the latest version of airodump-ng,​ rtap0 will be created for you automatically in case you didn't before.
- 
- 
  
 ===== Launch the chopchop attack ===== ===== Launch the chopchop attack =====
Line 155: Line 128:
  
 If the attack fails, try to rerun the command again ommiting the "-h <AP MAC>"​ parameter. If the attack fails, try to rerun the command again ommiting the "-h <AP MAC>"​ parameter.
- 
- 
- 
- 
- 
- 
- 
- 
- 
  
 ===== Create the arp request packet ===== ===== Create the arp request packet =====
Line 172: Line 136:
        
      # packetforge-ng -0 -a <AP MAC> -h 00:​11:​22:​33:​44:​55 -k 192.168.1.100 -l 192.168.1.101 -y replay_dec-####​.xor -w arp-request      # packetforge-ng -0 -a <AP MAC> -h 00:​11:​22:​33:​44:​55 -k 192.168.1.100 -l 192.168.1.101 -y replay_dec-####​.xor -w arp-request
- 
- 
- 
  
 ===== Send the arp request over and over ===== ===== Send the arp request over and over =====
Line 182: Line 143:
  
       # aireplay-ng -2 -r arp-request eth1       # aireplay-ng -2 -r arp-request eth1
- 
- 
- 
- 
- 
- 
- 
- 
  
 ===== Wait to gather enough IVs ===== ===== Wait to gather enough IVs =====
  
-We have to wait now so airodump-ng gathers enough data (enough IVs) so we can run airocrack-ng.  +We have to wait now so airodump-ng gathers enough data (enough IVs) so we can run aircrack-ng.  
-How many packages we need so airocrack-ng cracks the wep key? It depends. The version of  +How many packages we need so aircrack-ng cracks the wep key? It depends. The version of  
-airocrack-ng that comes with backtrack2 is not the lastest ​one so we need around 1.000.000 of IVs.+aircrack-ng that comes with backtrack2 is not the latest ​one so we need around 1.000.000 of IVs.
 If we are using the latest version (0.9 and up) 100.000 is enough. If we are using the latest version (0.9 and up) 100.000 is enough.
- 
  
 ===== Crack the wep key using aircrack-ng ===== ===== Crack the wep key using aircrack-ng =====
Line 205: Line 157:
       # aircrack-ng -z dump*.cap       # aircrack-ng -z dump*.cap
  
-Depending the number of packages you have gathered, this may take some minutes or you may get the key inmediately+Depending the number of packages you have gathered, this may take some minutes or you may get the key immediately
-The -z argument tells aircrack-nt to try a ptw attack ​also. If you version of aircrack-ng doesn'​t support it, just +The -z argument tells aircrack-ng to also try the PTW attack. If you version of aircrack-ng doesn'​t support it, just 
-ommit it.+omit it.
  
 === NOTE: === === NOTE: ===
Line 214: Line 166:
 wait for more data to be gathered. wait for more data to be gathered.
  
- 
-  
ipw2200_generic.txt · Last modified: 2009/09/26 14:27 by darkaudax