04-12-2009
|
#16
|
|
Registered Member
Last Online: 09-06-2011
Join Date: Oct 2006
Posts: 397
Thanks: 262
Thanked 215 Times in 87 Posts
Groans: 0
Groaned at 0 Times in 0 Posts
|
Hey Bro,
I'm Replying Now Through A Cracked Wireless Connection
WEP Cracking Is Very Easy.. And As Edgard Said, It Might Take 10 Minutes To Crack WEP! And Believe Me Some Times 2 Minutes And As Edgard Said You Need To Capture As Much IVs As You Can And Dump Them Into File And Then Use Aircrack-ng To Get The Key..
But WPA And WPA2 Cracking Have Different Technique Than WEP Cracking, For WPA(2) You Need To Capture A Four Way Handshake And Dump It Into A File And Then Use A Dictionary Attack Or A Bruteforce Attack To Get The Key!
Moreover, If You Want To Crack A Wireless Connection Your Wireless Card Must Support Monitoring And You Must Have The Appropriate Drivers And PATCHES Installed..
I Recommend You To Use The BackTrack Linux Distribution Which Contains Tons Of Hacking And Penetration Testing Tools (Including aircrack) With The Appropriate Patches Of The Supported Cards That Support Packet Re-Injection..
And Btw, To Be Able To Use airodump-ng, Your Card Must Be Switched To Monitoring Mode.. And In Order To Do That (Everything Is Under Linux Ok?) You Have To Know First The Name Of Your Wireless Interface.. Just Open The Terminal And Type:
iwconfig
Its Name May Be: wlan0, rausb0, auth0... etc
Well Now To Switch Your Wireless Card To Monitoring Mode (As Root
ifconfig wlan0 down (wlan0 Is The Name Of The Interface, It May Be Different For You!)
Then:
iwconfig wlan0 mode monitor
Then:
ifconfig wlan0 up
Ayt?
In Addition To The Above, There Are Three Types Of Attacking WEP Encrypted Wireless...
Interactive Attack: When A Client Is Connected To The Access Point
Fake Authentication: When Nobody Is Connected To The Access Point
Deauthentication Attack: When Mac Address Filtering Is Enabled!
Feel Free To Ask Any Question
__________________
من؟ من سينزع سلاح حزب الله!؟
|
|
|