http://www.topsight.net/article.php/20050615154352676http://new.remote-exploit.org/index.php/Router_sniffHow To Crack WEP – Part 1: Setup & Network Recon Updated June 9, 2005
Introduction
Hundreds, perhaps thousands of articles have been written about the vulnerability of WEP (
Wired Equivalent Privacy), but how many people can actually break WEP encryption? Beginners to WEP cracking have often been frustrated by the many wireless cards available and their distribution-specific commands. And things are further complicated when the beginner is not familiar with Linux.
In this three part series, we will give you a step by step approach to breaking a WEP key. The approach taken will be to standardize as many variables as possible so that you can concentrate on the mechanics of WEP cracking without being hindered by hardware and software bugs. The entire attack is done with publicly available software and doesn't require special hardware—just a few laptops and wireless cards.
This first article will help you set up your wireless lab and guide you through the scanning portion of WEP cracking. After all, you will need to find and document the wireless networks before you can crack them. The
second article will describe the stimulation of the target WLAN to generate traffic and the actual process of capturing data and cracking the WEP key. After reading these two articles, you should be able to break WEP keys in a matter of minutes. A
third article will turn things around and describe how to defend against multiple skill levels of wireless intruders
NOTES: -
A description of the basic approach and techniques used in this How To can be found in The Feds can own your WLAN too.
-
You don't need to be a networking expert to successfully follow this How To, but you need basic familiarity with networking terminology and principles. You should know how to ping, open a Windows Command Prompt, enter command lines and know your way around the Windows networking properties screens.
Introduction What you Need What you Need – more Lab Setup – Preparing the Target WLAN Lab Setup – AP Lab Setup – Preparing the Notebooks Network Recon with Kismet Network Recon with Kismet – more Conclusion