Pages

Thursday, 16 June 2011

WEP Key Cracking Using Backtrack: Step by Step Tutorial


 A. SCOPE
This tutorial is intended for user’s with little or no experience with linux or wifi. The folks over
at remote-exploit have released “Backtrack” a tool which makes it ridiculously easy to access 
any network secured by WEP encryption. This tutorial aims to guide you through the process 
of using it effectively.

Required Tools

  • You will need a computer with a wireless adapter listed here
  • Download Backtrack and burn it’s image to a CD

B. OVERVIEW

BACKTRACK is a bootable live cd with a myriad of wireless and tcp/ip networking tools. 
This tutorial will only cover the included kismet and aircrack-ng suite of tools.


Tools Overview

  • Kismet – a wireless network detector and packet sniffer
  • airmon – a tool that can help you set your wireless adapter into monitor mode (rfmon)
  • airodump – a tool for capturing packets from a wireless router (otherwise known as an AP)
  • aireplay – a tool for forging ARP requests
  • aircrack – a tool for decrypting WEP keys
  • iwconfig – a tool for configuring wireless adapters. You can use this to ensure that your wireless adapter is in “monitor” mode which is essential to sending fake ARP requests to the target router
  • macchanger – a tool that allows you to view and/or spoof (fake) your MAC address

Glossary of Terms

  • AP: Access Point: a wireless router
  • MAC Address: Media Access Control address, a unique id assigned to wireless adapters and routers. It comes in hexadecimal format (ie 00:11:ef:22:a3:6a)
  • BSSID: Access Point’s MAC address
  • ESSID: Access Point’s Broadcast name. (ie linksys, default, belkin etc) Some AP’s will not broadcast their name but Kismet may be able to detect it anyway
  • TERMINAL: MS-Dos like command line interface. You can open this by clicking the black box icon next to the start key in backtrack
  • WEP: short for Wired Equivalency Privacy, it is a security protocol for Wi-Fi networks
  • WPA: short for WiFi Protected Access. a more secure protocal than WEP for wireless networks. NOTE: this tutorial does not cover cracking WPA encryption


Since Backtrack is a live CD running off your cdrom, there is nowhere that you can write files to unless you have a linux partition on your hard drive or a usb storage device. Backtrack has some NTFS support so you will be able to browse to your windows based hard drive should you have one, but it will mount the partition as “read-only”. I dual boot windows and ubuntu on my laptop so I already have a linux swap partition and a reiserfs partition. Backtrack had no problem detecting these and mounting them for me. To find your hard drive or usb storage device, just browse to the /mnt folder in the file manager. Typically a hard drive will appear named something like hda1 or hda2 if you have more than one partition on the drive. Alternately hdb1 could show if you have more than one hard disk. Having somewhere to write files that you can access in case you need to reboot makes the whole process a little easier.

C. DISCLAIMER

Hacking into someone’s wireless network without permission is probably against the law. I wouldn’t recommend doing it. I didn’t break into anyone else’s network while learning how to do this.

D. IMPLEMENTATION

STEP 1

Monitoring Wireless Traffic With Kismet

Place the backtrack CD into your cd-rom drive and boot into Backtrack. You may need to change a setting in your bios to boot from cd rom. During boot up you should see a message like “Hit ctrl+esc to change bios settings”. Changing your first boot device to cdrom will do the trick. Once booted into linux, login as root with username: root password: toor. These are the default username and password used by backtrack. A command prompt will appear. Type startx to start KDE (a ‘windows’ like workspace for linux).
Once KDE is up and running start kismet by clicking on the start key and browsing to Backtrack->Wireless Tools -> Analyzers ->Kismet. Alternatively you can open a Terminal and type:
kismet
Kismet will start running and may prompt you for your wireless adapter. Choose the appropriate adapter, most likely ‘ath0′, and sit back as kismet starts detecting networks in range.

NOTE: We use kismet for two reasons.

  1. To find the bssid, essid, and channel number of the AP you are accessing.
  2. Kismet automatically puts your wireless adapter into monitor mode (rfmon). It does this by creating a VAP (virtual access point?) or in other words, instead of only having ath0 as my wireless card it creates a virtual wifi0 and puts ath0 into monitor mode automatically. To find out your device’s name just type:
iwconfig
Which will look something like this:
While kismet detects networks and various clients accessing those networks you might want to type ‘s’ and then ‘Q’ (case sensitive). This sorts all of the AP’s in your area by their signal strength. The default ‘autofit’ mode that kismet starts up in doesn’t allow you much flexibility. By sorting AP’s by signal strength you can scroll through the list with the arrow keys and hit enter on any AP you want more information on. (side note: when selecting target AP keep in mind this tutorial only covers accessing host AP’s that use WEP encryption. In kismet the flags for encryption are Y/N/0. Y=WEP N=Open Network- no encryption 0= other: WPA most likely.) Further reading on Kismet is available here.
Select the AP (access point) you want to access. Copy and paste the broadcast name(essid), mac address(bssid), and channel number of your target AP into a text editor. Backtrack is KDE based so you can use kwrite. Just open a terminal and type in ‘kwrite’ or select it from the start button. In Backtrack’s terminal to copy and paste you use shift+ctrl+c and shift+control+v respectively. Leave kismet running to leave your wireless adapter in monitor mode. You can also use airmon to do this manually. airmon-ng -h for more help with this

STEP 2

Collecting Data With Airodump

Open up a new terminal and start airodump so we can collect ARP replies from the target AP. Airodump is fairly straight forward for help with this program you can always type “airodump-ng -h” at the command prompt for additional options.
airodump-ng ath0 -w /mnt/hda2/home/ryan/belkin_slax_rcu 9 1
Breaking down this command:
  • ath0 is my wireless card
  • -w tells airodump to write the file to
    /mnt/hda2/ryan/belkin_slax_rcu
  • 9 is the channel 9 of my target AP
  • 1 tells airodump to only collect IVS – the data packets with the WEP key

STEP 3

Associate your wireless card with the AP you are accessing.

aireplay-ng -1 0 -e belkin -a 00:11:22:33:44:55 -h 00:fe:22:33:f4:e5 ath0
  • -1 at the beginning specifies the type of attack. In this case we want fake authentication with AP. You can view all options by typing aireplay-ng -h
  • 0 specifies the delay between attacks
  • -e is the essid tag. belkin is the essid or broadcast name of my target AP. Linksys or default are other common names
  • -a is the bssid tag(MAC address). 00:11:22:33:44:55 is the MAC address of the target AP
  • -h is your wireless adapters MAC addy. You can use macchanger to view and change your mac address. macchanger -s ath0
  • ath0 at the end is my wireless adapters device name in linux

STEP 4

Start packet injection with aireplay

aireplay-ng -3 -b 00:11:22:33:44:55 -h 00:fe:22:33:f4:e5 ath0

NOTES:

  • -b requires the MAC address of the AP we are accessing.
  • -h is your wireless adapters MAC addy. You can use macchanger to view and change your mac address. macchanger -s ath0
  • if packets are being collected at a slow pace you can typeiwconfig ath0 rate auto to adjust your wireless adapter’s transmission rate. You can find your AP’s transmission rate in kismet by using the arrow keys up or down to select the AP and hitting enter. A dialog box will pop up with additional information. Common rates are 11M or 54M.
As aireplay runs, ARP packets count will slowly increase. This may take a while if there aren’t many ARP requests from other computers on the network. As it runs however, the ARP count should start to increase more quickly. If ARP count stops increasing, just open up a new terminal and re-associate with the ap via step 3. There is no need to close the open aireplay terminal window before doing this. Just do it simultaneously. You will probably need somewhere between 200-500k IV data packets for aircrack to break the WEP key.

If you get a message like this:

Notice: got a deauth/disassoc packet. Is the source MAC associated ?
Just reassociate with the AP following the instructions on step 3.

STEP 5

Decrypting the WEP Key with Aircrack

Find the location of the captured IVS file you specified in step 2. Then type in a terminal:
aircrack-ng -s /mnt/hda2/home/belkin_slax_rcu-03.ivs
Change /mnt/hda2/home/belkin_slax_rcu-03.ivs to your file’s location
Once you have enough captured data packets decrypting the key will only take a couple of seconds. For my AP it took me 380k data packets. If aircrack doesn’t find a key almost immediately, just sit back and wait for more data packets.
If this guide doesn’t fully answer your questions you can always refer to the forums at remote-exploit.org

7 comments:

Anonymous said...

thanx dear broooooooooooooooooo...this is very helpfullllllllll..thanx againnnnnnn

Anonymous said...

thaaaaaaaaaaanxxxxx

Anonymous said...

DO YOU WANNA RECOVER YOUR HARD EARNED MONEY ON BINARY OPTIONS???

Binary options may be used in theoretical asset pricing, they are prone to fraud in their applications and hence banned by regulators in many jurisdictions as a form of gambling. Many binary option outlets have been exposed as fraudulent. The U.S. FBI is investigating binary option scams throughout the world, and the Israeli police have tied the industry to criminal syndicates. The European Union is publishing regulations that will ban binary options trading. ASIC considers binary options as a “high-risk” and “unpredictable” investment option. Most people have lost their hard earned money through this binary options shit, yet they would go to meet scammers unknowingly to help them recover their money and they would end up losing more money in the process. You can easily identify these scammers with their Fake Testimonies, the thing is most of all these testimonies ya’ll are reading on these forums are fake, scammers are just trying to lure you into their Arms to get you ruined more.
The Only People who are capable of helping you to recover your money are HACKERS, most of this Binary option companies are scam so therefore they have weak Database security, and their vulnerabilities can be exploited easily with the Help of our Special HackTools, Root HackTools And Technical Hacking Strategies. All we do is to hack into the Company’s Database, Extract your files and documents, Decrypt your Transaction Details and some Technical Hacking Procedures follows then you have your money recovered in Bitcoins. We have a trained team of seasoned professionals under various skillsets when it comes to Hacking. Our company in fact houses a separate group of Hackers who are productively focussed and established authorities in different platforms. They hail from a proven track record Called “HackerOne” and have cracked even the toughest of barriers to intrude and capture or recapture all relevant datas needed by our Clients. Some Of These Hackers Includes PETER YAWORSKI, FRANS ROSEN, JACK CABLE, JOBERT ABMA, ARNE SWINNEN And More
COMPOSITE HACKS is available for customer care 24/7, And You Can Also Contact us for other Technical Hacking Services you desire Such As:
* WEBSITE HACKING
* PHONE HACKING (giving you Unnoticeable access to everything Happening on the Target’s Phone)
* LOCATION TRACKING
* SOCIAL MEDIA HACKING etc


CONTACTS:
* For Binary Options Recovery
E-mail: Binaryoptionrecovery@gmail.com
* For Other Hacking Services
E-mail: compositehacks@gmail.com
Wickr: compositehacks

Curt Lennix said...

Need The To Hire A Hacker❓ Then contact PYTHONAX✅

The really amazing deal about contacting PYTHONAX is that the Hack done by us can’t get traced to you, as every Hacking job we do is strongly protected by our Firewall. It’s like saying if anyone tries to trace the Hack, it will lead them to us and we block whatever actions they are doing.

We have been Invisible to Authorities for almost a decade now and if you google PYTHONAX, not really about us comes out, you can only see comments made by us or about us.

Another Amazing thing to you benefit from Hiring our Hackers is that you get a Legit and the best Hacking service, As we provide you with Professional Hackers who have their Hacking Areas of specialization.
We perform every Hack there is, using special Hacking tools we get from the dark web.

Some list of Hacking Services we provide are-:
▪️Phone Hacking & Cloning ✅
▪️Computer Hacking ✅
▪️Emails & Social Media Account Hacking✅
▪️Recovering Deleted Files✅
▪️Tracking & Finding People ✅
▪️Hunting Down Scammers✅
▪️Hack detecting ✅
▪️Stealing/Copying Files & Documents From Restricted Networks and Servers ✅
▪️Bitcoin Multiplication✅
▪️Binary Option Money Recovery ✅
▪️Forex Trading Money Recovery✅
▪️IQ Option Money Recovery✅
And lots more......

Whatever Hacking service you require, just give us an Email to the Emails Address provided below.
pythonaxhacks@gmail.com
pythonaxservices@gmail.com

2020 © PYTHONAX.

Curt Lennix said...



GET THE BEST HACKING SERVICE‼️
PYTHONAX HACKS
Motto-: Hacking Just Got Easier

Get to hire a Hacker from one of the best Hacking groups there is. PYTHONAX are a group of talented hackers who have been Hacking in secret for almost a decade now. When we take up a Hacking Job, you have the assurance that it’s will be done. We stayed in hidden but the numbers of False Hackers has increased over the years and this has caused us to come out in the open.

Here Are List Of Hacking Services We Offer-:

▪️Phone Hacking & Cloning

▪️Email Hacking

▪️Social Media Hacking(Facebook, Instagram e.t.c)

▪️Computer Hacking

▪️Deleted Files & Documents Recovery

▪️Breach Detection

▪️Website Hacking

▪️Tracking using GPS and Spyware

▪️Deleted Mails and Text messages Recovery

OTHER SPECIAL HACKING SERVICES

▪️Binary Option Recovery

▪️Scam Money Recovery

▪️Bitcoin Multiplication

▪️Change Of Grades In Universities/Colleges

▪️Phone Calls Monitoring

▪️And lots more...........

For more enquire, contact us via the emails below
Pythonaxservices@gmail.com
Pythonaxhacks@gmail.com

Pythonax
2020 © All Right Reserved.

الهوارى للديكور said...

c
اعمال مميزة من شركة الهواري للمقاولات تقدم افضل اعمال تدبيش الترع والاسوار والميول بافضل خامات حجر الدبش المميزة بارخص الاسعار

حجر الدبش لاعمال الترع والاسوار في مصر | شركة الهواري
اسعار حجر البازلت المتداوله فى مصر لعام 2021
اسعار حجر الدبش فى مصر لعام 2021
اسعار توريد وتركيب القرميد البلاستيك 2021


افضل عروض وخصومات على اسعار التدبيش في مصر 2021 من شركة الهواري للمقاولات افضل شركة توريد وتركيب حجر الدبش باسعار خاصة

اسعار حجر التدبيش في مصر 2021 | شركة الهواري
اسعار توريد حجر الدبش من المحاجر فى مصر 2021
اسعار تركيب الحجر البازلت فى مصر 2021
اسعار توريد القرميد التركي فى مصر لعام 2021

charles said...

I know of a group of private investigators who can help you with they are also hackers but prefer to be called private investigators They can help with your bitcoin issues and your clients will be happy doing business with you,they can also help yo with your bad credit score,hacking into phones,binary recovery,wiping criminal records,increase school score, stolen files in your office or school,blank atm etc. Just name it and you will live a better life
whatsapp +1 (984) 733-3673
Premiumhackservices@gmail.com