User Tools

Site Tools


shared_key

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
shared_key [2008/07/13 23:45]
mister_x typo
shared_key [2018/03/11 20:19] (current)
mister_x Removed link to trac
Line 1: Line 1:
 ====== Tutorial: How to do shared key fake authentication ? ====== ====== Tutorial: How to do shared key fake authentication ? ======
-Version: 1.07.1 May 9, 2008\\+Version: 1.08 November 7, 2008\\
 By: darkAudax By: darkAudax
  
Line 17: Line 17:
 It is recommended that you experiment with your home wireless access point to get familiar with these ideas and techniques. If you do not own a particular access point, please remember to get permission from the owner prior to playing with it. It is recommended that you experiment with your home wireless access point to get familiar with these ideas and techniques. If you do not own a particular access point, please remember to get permission from the owner prior to playing with it.
  
-I would like to acknowledge and thank the [[http://​trac.aircrack-ng.org/​wiki/​Team|Aircrack-ng team]] for producing such a great robust tool. +I would like to acknowledge and thank the Aircrack-ng team for producing such a great robust tool. 
  
 Please send me any constructive feedback, positive or negative. Additional troubleshooting ideas and tips are especially welcome. Please send me any constructive feedback, positive or negative. Additional troubleshooting ideas and tips are especially welcome.
Line 58: Line 58:
 ==== Solution Overview ==== ==== Solution Overview ====
  
-In order to do a shared key fake authentication,​ you need to have a PRGA (pseudo random ​genration ​algorithm) xor file to feed into it.  We will look at the detailed steps to obtain this in a typical scenario. ​ Then use the PRGA xor file to do a fake authentication.+In order to do a shared key fake authentication,​ you need to have a PRGA (pseudo random ​generation ​algorithm) xor file to feed into it.  We will look at the detailed steps to obtain this in a typical scenario. ​ Then use the PRGA xor file to do a fake authentication.
  
 Here are the basic steps we will be going through: Here are the basic steps we will be going through:
Line 107: Line 107:
 In the response above, you can see that ath0 is in monitor mode, on the 2.452GHz frequency which is channel 9 and the Access Point shows the MAC address of your wireless card.  Only the madwifi-ng drivers show the MAC address of the card in the AP field, other drivers do no.  So everything is good.   It is important to confirm all this information prior to proceeding, otherwise the following steps will not work properly. In the response above, you can see that ath0 is in monitor mode, on the 2.452GHz frequency which is channel 9 and the Access Point shows the MAC address of your wireless card.  Only the madwifi-ng drivers show the MAC address of the card in the AP field, other drivers do no.  So everything is good.   It is important to confirm all this information prior to proceeding, otherwise the following steps will not work properly.
  
-To match the frequency to the channel, check out: +To match the frequency to the channel, check out: http://www.cisco.com/en/US/​docs/​wireless/​technology/​channel/​deployment/​guide/Channel.html#​wp134132 ​.  This will give you the frequency for each channel.
-http://www.rflinx.com/help/calculations/#​2.4ghz_wifi_channels then select the "​Wifi ​Channel ​Selection and Channel Overlap"​ tab.  This will give you the frequency for each channel.+
  
 === Troubleshooting Tips === === Troubleshooting Tips ===
Line 139: Line 138:
     00:​14:​6C:​7E:​40:​80 ​ 00:​0F:​B5:​34:​30:​30 ​  ​61 ​    ​0 ​       7            00:​14:​6C:​7E:​40:​80 ​ 00:​0F:​B5:​34:​30:​30 ​  ​61 ​    ​0 ​       7       
  
-Once "PSK" appears on the airodump-ng screen, do  file listing and it will look something like:+Once "SKA" appears on the airodump-ng screen ​like in example above, do  file listing and it will look something like:
  
    ​sharedkey-01-00-14-6C-7E-40-80.xor ​ sharedkey-01.cap ​ sharedkey-01.txt    ​sharedkey-01-00-14-6C-7E-40-80.xor ​ sharedkey-01.cap ​ sharedkey-01.txt
shared_key.1215985548.txt.gz · Last modified: 2008/07/13 23:45 by mister_x