How To Crack WEP - Part 2: Performing the Crack
In Part 2 of this series, Humphrey Cheung shows how to use the tools configured in Part 1 to capture data and perform a WEP key recovery.
Here at Tom’s Guide our expert editors are committed to bringing you the best news, reviews and guides to help you stay informed and ahead of the curve!
You are now subscribed
Your newsletter sign-up was successful
Want to add more newsletters?
Daily (Mon-Sun)
Tom's Guide Daily
Sign up to get the latest updates on all of your favorite content! From cutting-edge tech news and the hottest streaming buzz to unbeatable deals on the best products and in-depth reviews, we’ve got you covered.
Weekly on Thursday
Tom's AI Guide
Be AI savvy with your weekly newsletter summing up all the biggest AI news you need to know. Plus, analysis from our AI editor and tips on how to use the latest AI tools!
Weekly on Friday
Tom's iGuide
Unlock the vast world of Apple news straight to your inbox. With coverage on everything from exciting product launches to essential software updates, this is your go-to source for the latest updates on all the best Apple content.
Weekly on Monday
Tom's Streaming Guide
Our weekly newsletter is expertly crafted to immerse you in the world of streaming. Stay updated on the latest releases and our top recommendations across your favorite streaming platforms.
Join the club
Get full access to premium articles, exclusive features and a growing list of member rewards.
Introduction
This article was updated in May of 2008 to reflect changes in software availability. For example, the Auditor Security Collection CD mentioned previously in this article is no longer readily available. Instead, we recommend using Backtrack, which is based on Auditor. We are sure you will be able to get through the instructions with a little creative interpretation, which is better than having to figure out alternatives to software that is not available. In addition to dealing with software, we also checked and updated all links.
In Part 1 of How to Crack WEP, we showed the basic approach to WEP cracking, configured a practice target WLAN and configured both sniffing and attack computers. We also introduced the Backtrack Collection and used Kismet to find in-range wireless LANs.
In this article, we will describe how to use additional tools found on the Backtrack CD to capture traffic and use it to crack a WEP key. We’ll also describe how to use deauthentication and packet replay attacks to stimulate the generation of wireless traffic that is a key element of reducing the time it takes to perform a WEP key crack.
Before we get started, however, let us make a few points that may save some readers the time and effort of trying these techniques:
To successfully follow this How To, you need basic familiarity with networking terminology and principles. You should know how to ping, open a Windows Command Prompt, enter command lines and know your way around the Windows networking properties screens. Basic familiarity with Linux will be helpful too.
These procedures assume the use of specific wireless hardware described in Part 1. They will not work with other hardware types without modification.
These procedures assume that the target WLAN has at least one client associated with an AP or wireless router. They will not work with an AP that has no associated clients.
Get instant access to breaking news, the hottest reviews, great deals and helpful tips.
Accessing anyone else’s network other than your own without the network owner’s consent is illegal. Toms Guide, Bestofmedia and the author do not condone or approve of illegal use of this tutorial in any way
Also note that it is possible to perform WEP cracking using only one computer. But we have chosen to use two to more clearly illustrate the process and avoid some of the complications caused by using a single computer.
The four main tools used in this article are airodump, void11, aireplay and aircrack, which are included on the Backtrack CD:
Airodump scans the wireless network for packets and captures these packets into files
From your scanning with Kismet as described in Part 1, you should have written down the following four pieces of information:
MAC Address of the wireless Access Point (AP)
In the following procedures, we will call our laptops, Auditor-A and Auditor-B and call the target computer Target. Let’s get started.
Current page: How To Crack WEP - Part 2: Performing the Crack
Next Page Starting from scratchHumphrey Cheung is a consulting systems engineer for Cisco Meraki who has also worked as a freelance videographer and reporter. He was previously a senior editor for Tom's Hardware and his work has also been featured on Tom's Guide, CNN, The New York Times, NBC, FOX, plus many other publications.
