Penetration Testing mailing list archives

Re: Cracking WEP and WPA keys


From: Robin Wood <dninja () gmail com>
Date: Thu, 15 Dec 2005 13:37:28 +0000

I'll take this one to the wireless list once I've subscribed but just
to let people know that I tried again to crack my key and failed. I
collected 1million IVs with a mix of aireplay and copying large files
between devices. Even with that I still hadn't cracked it after 521
minutes so I gave up.

I'm going to have a read of all the articles that people sent me and
if I have any more prolems I'll put them on the wireless list.

Thanks All

Robin

PS the machine doing the cracking is a Sempron 3000+ with a gig of ram
in case anyone was going to suggest the machine may not be up to it!

On 12/15/05, Fabien Degouet <fdegouet () conthackto com mx> wrote:
In fact, as it is a statiscical attack, it does not depend on the "weaks IV"
but on the quantity.
It's like the more unique IVs, the higher the probability to find the wep
key quicker. Anyway, it's probability, even a 99% probability does not
ensure you'll win!!
In practice I used to crack 104 bit wep keys with around 500 000 packets. If
you're not lucky you will need more, till a million packets.

While collecting packets you can run aircrack. For example you have
collected 500 k packets, you can run aircrack on the capture file as it
still grows (capturing with airodump), it is even faster. That's what I
usually do.


Fabien Degouet


----- Original Message -----
From: "Eduardo Espina" <eduardomx () gmail com>
To: <pen-test () securityfocus com>
Sent: Tuesday, December 13, 2005 9:55 AM
Subject: Cracking WEP and WPA keys




I cracked my own WEP a few months ago, I just needed to collect about
800,000
IVs with airodump, then ran aircrack and I got the key in less than one
second.
(104 bit WEP) By the way, i collected the whole traffic in 2 hours.

It doesn't just depend on the number of collected IVs, but the weak IVs
and your
hardware. My frist try was using a 3Com Card, but I wasn't collecting
enough
IVs, then I tried with a Prism2 Intersil card and it was done.

You should give it more time to the airodump stage than to the aircrack
one.

Greetings,
Eduardo.

--
Eduardo Espina Garcia <eespina () seguridad unam mx>
Departamento de Seguridad en Computo - UNAM-CERT DGSCA, UNAM
http://www.seguridad.unam.mx  Tel.: 5622-8169  Fax: 5622-8043
GPG Key Fingerprint: "8E86 932F C364 03BE 39B8  3F9D D27E 438A 3C6A 750F"
"No matter how hard you try to keep your secret, it's a universal
law that sooner or later it will be discovered."

--------------------------------------------------------------------------
----
Audit your website security with Acunetix Web Vulnerability Scanner:

Hackers are concentrating their efforts on attacking applications on your
website. Up to 75% of cyber attacks are launched on shopping carts, forms,
login pages, dynamic content etc. Firewalls, SSL and locked-down servers
are
futile against web application hacking. Check your website for
vulnerabilities
to SQL injection, Cross site scripting and other web attacks before
hackers do!
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
--------------------------------------------------------------------------
-----



------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner:

Hackers are concentrating their efforts on attacking applications on your
website. Up to 75% of cyber attacks are launched on shopping carts, forms,
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are
futile against web application hacking. Check your website for vulnerabilities
to SQL injection, Cross site scripting and other web attacks before hackers do!
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------



------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner:

Hackers are concentrating their efforts on attacking applications on your
website. Up to 75% of cyber attacks are launched on shopping carts, forms,
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are
futile against web application hacking. Check your website for vulnerabilities
to SQL injection, Cross site scripting and other web attacks before hackers do!
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------


Current thread: