Wi-Fi Hacking using Backtrack.
-----------------------------------------------------------------------------------------------------------
1) First we need to scan for
available wireless networks.
There’s this great tool for windows to do this called “NetStumbler” Or you can use Kismet for
Windows and Linux and KisMac for Mac.
The two most common encryption
types are:
1) WEP
2) WAP
WEP i.e Wire
Equivalent Privacy is not consideres as safe as WAP i.e Wireless Application
Protocol.
WEP have many flaws that allows a hacker to crack a WEP key easily..Whereas
WAP is currently
the most secure and best option to secure a Wi-Fi network.. It
can’t be easily cracked as WEP
because the only way to retrieve a WAP key is to use a brute-force attack or dictionary attack.
Here I’ll tell you how to Crack WEP To crack WEP we will be using Live Linux distribution called
BackTrack to crack WEP.
BackTrack have lots of preinstalled
softwares for this very purpose.
The tools we will be using on Backtrack are:
Kismet – a wireless network
detector
Airodump – captures packets
from a wireless router
Aireplay – forges ARP requests
Aircrack – decrypts the WEP keys
1) First of all we have to find a wireless access point along with its bssid, essid and channel
number. To do this we will run kismet by opening up the terminal and typing in kismet. It may ask you for the appropriate adapter which in my case is ath0. You can see your device’s name by typing
in the command iwconfig.
2) To be able to do some of the later things, your wireless adapter must be put into monitor mode. Kismet
automatically does this and as long as
you keep it open, your wireless adapter
will stay in monitor mode
3) In kismet you will see the flags Y/N/0. Each one stands for a different type of encryption. In
our case we will be looking for access points with the WEP encryption. Y=WEP N=OPEN
0=OTHER (usually WAP).
4) Once you find an access point, open a text document and paste in the networks broadcast name (essid), its mac address (bssid) and its channel number. To get the above information, use the arrow keys to
select an access point and hit
<ENTER>
5) The next step is to start
collecting data from the access point
with airodump. Open up a new terminal
and start airodump by typing in the
command:
airodump-ng -c [channel#] –w [filename] –bssid [bssid] [device]
**In the above command
airodump-ng starts the program, the
channel of your access point goes after
-c , the file you wish to output the
data goes after -w ,and the MAC address
of the access point goes after –bssid. The command ends with the device name.** Make sure to leave out
the brackets.
6) Leave the above running and open another terminal. Next we will generate some fake packets to the target access point so that the speed of the data output will increase. Put in the following
command:
aireplay-ng -1 0 -a [bssid] –h 00:11:22:33:44:55:66 -e [essid] [device]
In the above command we are
using the airplay-ng program. The
-1 tells the program the specific
attack we wish to use which in this case is fake authentication with the access point. The 0 cites
the delay between attacks, -a is the MAC address of the target access point,
-h is your wireless adapters MAC address, -e is the name (essid) of the target access point, and the command ends
with the your wireless adapters device name.
7) Now, we will force the target access point to send out a huge amount of packets that we will be
able to take advantage of by using them to attempt to crack the WEP key. Once the following command
is executed, check your airodump-ng
terminal and you should see the ARP
packet count
to start to increase. The command is:
aireplay-ng -3 -b [bssid] –h 00:11:22:33:44:5:66 [device]
In this command, the -3 tells the program the specific type of attack which in this case is packet
injection, -b is the MAC address of the target access point, -h is your wireless
adapters MAC address,
and the wireless adapter device name goes at the end. Once you have collected around
50k-500k packets, you may begin the attempt to break the WEP key. The command
to begin the
cracking process is:
aircrack-ng -a 1 -b [bssid] -n 128 [filename].ivs
In this command the -a 1 forces the program into the WEP attack mode, the –b is the targets MAC address, and the -n 128 tells the program the length of WEP key. If you don’t know the -n , then leave it out.
This should crack the WEP key within seconds. The more packets you capture, the
bigger chance you have of cracking the WEP key. I have done a lot to write this
word by word and step by step.
So I hope you like it and Enjoy!!
::: eductional purpose only :::
No comments:
Post a Comment