Jimmy Posted June 2, 2011 Report Share Posted June 2, 2011 The Stuff that you are going to need is:(1) Backtrack (You can get it here >> Downloads(2) Wireless Card that Supports Packet InjectionBefore we Start, I take it for Granted that you are aware of a Few things...I Hope You already have a Live CD, Bootable USB or a Virtual Backtrack Installed in your System. In case of Virtual Machine, You will need an External Wireless Card. And in case you don't already have Backtrack, I suggest you bookmark this page and get it first.Also, I hope you have googled by now to see if your Wireless Card will support Packet Injection or not. Again, if you haven't already done that go and get this done first Now that we are Ready.. Lets Begin..If You are Using a Boot CD, As in my case, You will see the folllowing screen when the CD Loads.Just Select "Start BackTrack FrameBuffer (1024x768)"or Select "Start BackTrack FrameBuffer (800x600)"Depending On your Display Settings. These Options are to get to the GUI of Backtrack.What will follow next is the Loading of all Drivers and Other Processes. Once they come to a halt. You will See a Cursor. Just Type in "startx".Once, the Startup is Completed you will be at the Desktop of BacktrackNow, We better get our Network Interfaces Started. While there are a few ways of Doing that. The simplest way is through the Menu.Once, Network has been Started. We need to go Start a Konsole. Which we will be using to enter all commands to crack wep.Once, inside the Konsole. Type in "iwconfig" to see the status of all the network interfaces of your Machine.In My Case, My Wireless Interface is "wlan0". In your case, It can be any other or might just be wlan0. Remember, whatever your interface, replace my "wlan0" with it throughout the Tutorial now.Now that we know the Interface, we better put it on monitoring mode. To do that, we need to type this command.airmon-ng start wlan0Press ENTER and You will see that monitor mode for your Wireless Interface will be enabled now. In my case, the monitor mode has been enabled at "mon0". This will be our new Interface now not "wlan0".Now that the monitor mode has been enabled. We will scan our Area for any WEP Encrypted Wifi Networks. To do that we need to type the following command.airodump-ng --encrypt wep mon0What you will see Next will be A List of All the WEP Encrypted WIFI Networks around you. There are some details in there too. Here's a simple explanation of a few of themBSSID = MAC Address of the slave (Most Important)PWR = Signal StrengthCH = Channel NumberENC = Encryption TypeESSID= Name of slave's Network#Data = Amount of IVS Collected (Most Important)#/s = IVS Per SecondYou Might just wanna copy the BSSID as it is going to be used a lot.Our slave's DetailsBSSID= 00:50:F1:12:12:10CH = 1ESSID= {censored}Something, You might wanna know but is not useful for WEP is that the "STATION" are the Computers currently connected to the Network. As you can notice, My slave currently has a Computer connected to it.While STATION is important for WPA Hacking, It is not useful for WEP Hacking.Now that we have our slave in Sight. It is now time to target our Interface on collecting packets from it. So, now we will make our airodump-ng more specific to target it on our slave's Network.airodump-ng --bssid 00:50:F1:12:12:10 --channel 1 --encrypt wep --ivs --write wephack mon0Once You hit ENTER. You will notice that now our Wireless Interface will only focus on Our slave's Network (In this case: 00:50:F1:12:12:10)Now that we have targeted the slave's Network. It is time to Start gathering Packets from it. There are two ways for Doing it.(1) Fragment Attack(2) ArpreplayIts your Lucky day..lol.. I will be going through both.But before these attacks, we need to fool the Router into thinking that we are authenticated to receive data from it. To do this we will "fakeauth" the slave's Router.aireplay-ng --fakeauth 0 -a 00:50:F1:12:12:10 mon0Once, You hit ENTER you will see something Like this when the Attack is Successful.02:29:07 Sending Authentication Request (Open System) [ACK]02:29:07 Authentication successful02:29:07 Sending Association Request [ACK]02:29:07 Association Successful (AID: 1)Now that the Association is Successful. We will initiate the Process to collect Arps. First, We will try Arpreplay as it is a very simple attack. Here's the command.aireplay-ng --arpreplay -b 00:50:F1:12:12:10 mon0Once, You hit ENTER you will see something Like this. After a Few Seconds or Maybe a few minutes, You may see the number of arps rise. If that happens ARPREPLAY has been successful or else, We will have to move on to Fragment Attack.OK. Since, Our Arpreplay has failed we will now initiate a Fragment attack. Here's the codeaireplay-ng --fragment -b 00:50:F1:12:12:10 mon0Once, You hit ENTER. Out Network Interface will start to collect Packets from The slave's Router. When it asks you to use a particular packet. Just hit Y and press ENTER.It will now try to capture 1500 bytes of Keystream. This keystream will be stored in a XOR file as in my case- fragment -0123-023217.xor We will later use this very captured keystream to forge it into a packet using packetforge-ng.Basically, what we are going to do is use that keystream and make a valid packet out of it. Then we will use that packet to arpreplay our slave's Router. So, Lets make a packet then..packetforge-ng --arp -a 00:50:F1:12:12:10 -h 11:22:33:44:55:66 -l 255.255.255.255 -k 255.255.255.255 -y fragment-0123-023217.xor -w wepfragOK. To keep this command simple let me just say this. Here, "-a" is the slave's MAC Address and "-h" is our MAC Address which I just entered for namesake. Let the rest of the things be the same. For those extra Information Seekers.. You can pm me or just google it.Just hit ENTER and there we go, the Packet has been made.Now, We will use this packet to arp attack the slave's Router. Here's the Command.aireplay-ng --arpreplay -r wepfrag -b 00:50:F1:12:12:10 mon0Just hit ENTER and the Mag!c Finally begins...Now, Its Time to Play Wait & Watch... Just Wait till the #Data Table reaches 30000 or close...Once, You have enough #Data Packets. It is time to Initiate the Final Kill. aircrack. Here's the command.aircrack-ng wephack-01.ivsHit a Final ENTER and See the Process.. Will take a few Seconds or Minutes.. depending on the Password....And Voila... Here it is.... 1 Quote Link to comment Share on other sites More sharing options...
kanoticx Posted August 8, 2011 Report Share Posted August 8, 2011 stupid tutorials Quote Link to comment Share on other sites More sharing options...
Cheater Posted August 9, 2011 Report Share Posted August 9, 2011 @kanoticx, nu-i de mirare ca n-ai inteles nimic din tutorial...remarca ta spune totul.@Jimmy87, credite? && bun tutorial pt incepatori. Quote Link to comment Share on other sites More sharing options...
BorisSpk Posted August 12, 2011 Report Share Posted August 12, 2011 Nu-mi merge linku sa downloadez:(, bactrack-ul. Quote Link to comment Share on other sites More sharing options...
Moderators Dragos Posted August 12, 2011 Moderators Report Share Posted August 12, 2011 Nu-mi merge linku sa downloadez:(, bactrack-ul.BackTrack Download - Softpedia Quote Link to comment Share on other sites More sharing options...
nosferatu Posted August 12, 2011 Report Share Posted August 12, 2011 Sub windows exista ceva care sa functioneze decent pentru wpa simplu? Quote Link to comment Share on other sites More sharing options...
BorisSpk Posted August 12, 2011 Report Share Posted August 12, 2011 mersi am reusit. Quote Link to comment Share on other sites More sharing options...
connected Posted August 22, 2011 Report Share Posted August 22, 2011 stupid tutorialsexplicatimi va rog, cine mai foloseste WEPul? la default deja e WPA2...pentru el are cineva solutie? Quote Link to comment Share on other sites More sharing options...
wildchild Posted August 22, 2011 Report Share Posted August 22, 2011 rainbow tables, dictionare mari(si noroc) sau putere mare de calcul in cazul bruteforce. Quote Link to comment Share on other sites More sharing options...