Ok so nw i guess by now u guys must hve been familiar with windows registry..Now we are up for some real and serious hacking..many of us have wifi network at home or office..and we all normally keep it secured..but sometimes what happens is that some not so friendly neighbour hacks our wifi...and leaves no stone unturned to make sure that our internet bill burns our pocket...this post is aimed at illustrating some common security flaws with WEP.
WEP is wired equivalent privacy..It is generally the most commonly used algorithm in India to secure wireless networks.
Disclaimer: Attempting to access a network other than your own, or one you have permission to use is illegal. computervedas.blogspot.com is not to be held liable for any damages resulting from the use or misuse of the information in this post.
OOk so now this post unlike others is going to be little complicated..but hey i never said that its going to be that easy..
For this hack i am using HP Pavilion laptop with built-in Intel 4965agn network card
and Backtrack 4 linux OS.
Step1
Visit http://www.remote-exploit.org/backtrack_download.html and download backtrack 4 pre release iso and burn it on a DVD. Its free and can be run directly from the DVD so no need to install any OS. Once you have burned the iso boot your computer with the disc. If you dont know how to boot your computer with a dvd please post in comment, we would be happy to teach you.
Step2
Once you have succesfully booted linux you would be asked for username and password. so username is "root" and password is "toor". After entering the username and password type "startx" its a command used to load the kernel ..which is much like graphical user interface of windows.
Step3
Now you have to start the konsole. Its very much like Dos of windows. To start konsole click on a small "blank screen" like icon next to start.
Step4
Now you will have to capture wireless network packets without being associated with an access point. In simple words its called monitoring. To do this you will have to set the wireless card to monitor mode. To do this type the following command :-
iwconfig (to find all wireless network interfaces and their status)
airmon-ng start wlan0 (to set in monitor mode, you may have to substitute wlan0 for your own interface name)
Step5
Now next step is to find your target. For this type:-
airodump-ng mon0 (monitors all channels, listing available access points and associated clients within range)
It is best to select a target network with strong signal (PWR column), more traffic (Beacons/Data columns) and associated clients (listed below all access points). Once you've selected a target, note its Channel and BSSID (MAC address). Also note any STATION associated with the same BSSID (client MAC addresses).
Step6
Now the next step is to capture packets of our selected targets. For this type:-
airodump-ng -c 6 bssid 00:0F:CC:7D:5A:74 -w data mon0 (-c6 switch would capture data on channel 6, bssid 00:0F:CC:7D:5A:74 is the MAC address of our target access point, -w data specifies that we want to save captured packets into a file called "data" in the current directory, mon0 is our wireless network adapter)
You typically need between 20,000 and 40,000 data packets to successfully recover a WEP key.
Step7
Once you have collected enough packets you can crack the WEP key from the file in which packets have been stored. For this type the following :-
aircrack-ng data*.cap (assuming your capture file is called data...cap, and is located in the same directory)
and you will see the wep key in the console window..
hurrayyy..simple isnt it??
Well this hack is very simple if you follow procedures carefully. The only catch is that your wireless adaptor may not support monitor mode.
WEP within last few years has become very easy to hack..In few days we will teach you about WPA security..its difficult to hack but not impossible...we will be posting a tutorial on that also..
Legal Disclaimer
In any blog that deals with so many controversial topics and skills, it has become necessary to address a few incidents and implement a user terms and services agreement. We want to provide a free, safe and legal training environment to the users of this blog.
Computervedas is definitely not a place that promotes or encourages computer hacking (unethical), but rather it is a Computer Security related website. In fact, Computer Hacking and Computer Security are the two concepts that goes hand-in-hand. They are like the two faces of the same coin. So with the existence of close proximity between Hacking and Security, it is more likely that people often mistake our blog to be one that promotes Hacking. But in reality, our goal is to prevent hacking. We believe that unless you know how to hack (ethically), you cannot defend yourself from malicious hack attacks.
Your usage of this website constitutes your agreement to the following terms.
1. All the information provided on this blog are for educational purposes only. The blog is no way responsible for any misuse of the information.
2. This blog is totally meant for providing information on “Computer Security” “Computer Programming” and other related topics and is no way related towards the terms “CRACKING” or “HACKING” (Unethical).
3. Few articles (posts) on this blog may contain the information related to “Hacking Passwords” or “Hacking Email Accounts” (Or Similar terms). These are not the GUIDES of Hacking. They only provide information about the legal ways of retrieving the passwords. You shall not misuse the information to gain unauthorised access. However you may try out these hacks on your own computer at your own risk. Performing hack attempts (without permission) on computers that you do not own is illegal.
4.The virus creation section on this blog provides demonstration on coding simple viruses using high level programming languages. These viruses are simple ones and cause no serious damage to the computer. However we strongly insist that these information shall only be used to expand programming knowledge and not for causing malicious attacks.
5. All the information on this blog are meant for developing Hacker Defense attitude among the users and help preventing the hack attacks.We insist that these information shall not be used for causing any kind of damage directly or indirectly. However you may try these codes on your own computer at your own risk.
6. The word “Hack” or “Hacking” that is used on this blog shall be regarded as “Ethical Hack” or “Ethical Hacking” respectively.
7. We believe only in White Hat Hacking. On the other hand we condemn Black Hat Hacking.
8. Most of the information provided on this blog are simple computer tricks (may be called by the name hacks) and are no way related to the term hacking.
9. Some of the tricks provided by us may no longer work due to fixture in the bugs that enabled the exploits. We are not responsible for any direct or indirect damage caused due to the usage of the hacks provided on this site.
10. The blog holds no responsibility for the contents found in user comments and forum since we do not monitor them. However we may remove any sensitive information present in the user comments or on the forum upon request.
11. We reserve the right to modify the Disclaimer at any time without notice.
12.We believe that hacking is an art and one can put it to good use.Know Hacking but No Hacking!
Followers
USEFUL INFO
Labels
- About Us (1)
- Advanced Hacking (4)
- C++ (1)
- Gaming (1)
- Graphic Cards (1)
- Hardware (2)
- Miscellaneous (1)
- Simple Viruses (1)
- Windows 7 (3)
- Windows Xp (1)
- Windows Xp Hacks (5)