- Messages
- 3,626
- Reaction score
- 1
- Points
- 28
- Thread Starter
- #2,821
Tutorial: Cracking Wireless Networks with aircrack-ng (Part 4b - WEP)
Part 4: Capturing IVs (4.b.1 - capturing data packets for WEP-encrypted wireless networks)
Cracking WEP-encrypted wireless networks is easier than WPA/WPA2-encrypted wireless networks. The commands to be used for WEP cracking are very similar to the commands for cracking WPA/WPA2 cracking per the aircrack-ng.org website, but for today I will use a slightly modified set of steps which may be much simpler than the one posted on their website.
I have a Nokia N900 and I am using the steps that I will be sharing to you. I tested these steps on a desktop computer and they also worked. The same steps can be found on my Nokia N900 Tutorial Thread.
Initial Step: you must be running as root. Otherwise you will have to type "sudo" before each command that I have listed below.
1. Change the wireless receiver to Monitor Mode (listen to data packets)
2. Monitor for possible target networks
- If you are satisfied with the list of wireless networks that your computer is able to see, press Ctrl+K on your keyboard to stop.
- Identify your target network from the list (should have WEP encryption).
3. Capture data packets (IVs)
Example:
- Wait until you capture at least 15,000 up to around 400,000 packets (check #Data column)
- Press Ctrl + C on your keyboard to stop
You are now ready for the next step, which is the actual cracking of the WEP key. This can be done offline or even when you are not in range of the wireless network/router.
NOTE: If you want to see screenshots, you can visit the Nokia N900 tutorial on WEP cracking. The steps are exactly the same anyway.
Part 4: Capturing IVs (4.b.1 - capturing data packets for WEP-encrypted wireless networks)
Cracking WEP-encrypted wireless networks is easier than WPA/WPA2-encrypted wireless networks. The commands to be used for WEP cracking are very similar to the commands for cracking WPA/WPA2 cracking per the aircrack-ng.org website, but for today I will use a slightly modified set of steps which may be much simpler than the one posted on their website.
I have a Nokia N900 and I am using the steps that I will be sharing to you. I tested these steps on a desktop computer and they also worked. The same steps can be found on my Nokia N900 Tutorial Thread.
Initial Step: you must be running as root. Otherwise you will have to type "sudo" before each command that I have listed below.
1. Change the wireless receiver to Monitor Mode (listen to data packets)
Code:
[SIZE=4]ifconfig wlan0 down[/SIZE]
[SIZE=4]iwconfig wlan0 mode Monitor[/SIZE]
[SIZE=4]ifconfig wlan0 up[/SIZE]
2. Monitor for possible target networks
Code:
[SIZE=4]airodump-ng wlan0[/SIZE]
- If you are satisfied with the list of wireless networks that your computer is able to see, press Ctrl+K on your keyboard to stop.
- Identify your target network from the list (should have WEP encryption).
3. Capture data packets (IVs)
Code:
airodump-ng --channel (enter the channel number of your target here) --bssid (enter MAC address of target here) -w (filename of your captured data, you can enter whatever you want) --ivs wlan0
Example:
Code:
airodump-ng --channel 6 --bssid (xx:xx:xx:xx:xx:xx) -w susi --ivs wlan0
- Wait until you capture at least 15,000 up to around 400,000 packets (check #Data column)
- Press Ctrl + C on your keyboard to stop
You are now ready for the next step, which is the actual cracking of the WEP key. This can be done offline or even when you are not in range of the wireless network/router.
NOTE: If you want to see screenshots, you can visit the Nokia N900 tutorial on WEP cracking. The steps are exactly the same anyway.
Last edited: