Penetration Testing mailing list archives
Re: Wireless wep crackin on windows - corrections
From: "Andrew A. Vladimirov" <andrew () arhont com>
Date: Fri, 21 May 2004 03:49:05 +0100
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Chuck Herrin wrote: | | Hi All, | | AFAIK, there are no tools to crack WEP in Windows. (Somebody correct | me if I'm wrong!) Correction - see this: http://airsnort.shmoo.com/windows.html The project is at alpha stage but may work for you. Warning: The original Anton Ragers WEPCrack would not work on the Windows platform with Perl installed. You can also try to port the old good Tim Newsham's WEP Tools to Windows (shouldn't be difficult, have a look at the source) to run a dictionary or brute force attack, even though such attack is not very likely to succeed (especially against a 104 bit key) and takes time & large data pcap format dumps. | | Also, keep in mind that if you only have a few days to do this, it | may not be feasible to crack the WEP in Linux either, depending on | the amount of traffic coming across the ether. You can do some | things to create traffic, but if they're running an AP in a | conference room that doesn't get used very often (once a week, etc.), | you may have a hard time building enough of a key table to crack it | even if you had a *nix box. | | Just my $0.02, You can easily inject encrypted traffic into the target WLAN for additional traffic generation using Linux (WEPWedgie), BSD (Wnet reinj) or OS X (reinjection option in Kismac) tools. However, you can't accelerate WEP cracking by traffic injection using any Windows software (yet). If reliable connection-oriented (e.g. TCP) or routing protocols are used on the target WLAN, jamming the channel and causing frequent deauthentications (e.g. with FakeAP and Void11 combined) somewhat accelerates WEP cracking by increasing the amount of retransmits, thus generating additional traffic. Again, you can't do it from Windows yet. Check out our site (www.wi-foo.com) for all necessary drivers and tools. Just my $0.02++ :) Andrew. - -- Dr. Andrew A. Vladimirov CISSP #34081, CWNA, CCNP/CCDP, TIA Linux+ CSO Arhont Ltd - Information Security. Web: http://www.arhont.com ~ http://www.wi-foo.com Tel: +44 (0)870 44 31337 Fax: +44 (0)117 969 0141 GPG: Key ID - 0x1D312310 GPG: Server - gpg.arhont.com -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.3 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFArW4hlOHkKR0xIxARAtTZAJoC6Ixhj6vrMzYO4TUcXfe31HZZbgCg4lOA YBW3qXkXC2apEV0M3cHVZNI= =7jJA -----END PGP SIGNATURE-----
Current thread:
- Wireless wep crackin on windows securityfocus (May 20)
- RE: Wireless wep crackin on windows Jerry Shenk (May 20)
- RE: Wireless wep crackin on windows Chuck Herrin (May 20)
- Re: Wireless wep crackin on windows - corrections Andrew A. Vladimirov (May 21)
- RE: Wireless wep crackin on windows Chuck Herrin (May 20)
- Re: Wireless wep crackin on windows R. DuFresne (May 20)
- RE: Wireless wep crackin on windows Aaron Drew (May 21)
- Re: Wireless wep crackin on windows Andrew A. Vladimirov (May 21)
- RE: Wireless wep crackin on windows Aaron Drew (May 21)
- Re: Wireless wep crackin on windows Max (May 20)
- RE: Wireless wep crackin on windows Aaron Drew (May 21)
- Re: Wireless wep crackin on windows Andrew A. Vladimirov (May 21)
- RE: Wireless wep crackin on windows Aaron Drew (May 21)
- Re: Wireless wep crackin on windows E.Kellinis (May 25)
- RE: Wireless wep crackin on windows Jerry Shenk (May 25)
- Re: Wireless wep crackin on windows Andre Ludwig (May 26)
- RE: Wireless wep crackin on windows Jerry Shenk (May 25)
- <Possible follow-ups>
- RE: Wireless wep crackin on windows pen-test (May 21)
(Thread continues...)
- RE: Wireless wep crackin on windows Jerry Shenk (May 20)