This document provides instructions for cracking a WEP network using Commview and Aircrack-ng. It explains that you need to use Commview to capture packets from the target network, saving at least 15,000 packets. These packets are then opened in Wireshark format and loaded into Aircrack-ng to crack the password. Following the steps allows initialization vectors to be collected from the packets in order to crack the WEP key.
This project aims at cracking the Wi-Fi security(WEP,WPA-personal).It basically includes
intrusion in a BSS(Basic Service Set),monitoring the traffic in air, manipulate SSIDs, get details
of clients on a particular SSID, sniffing the packets to & from them to Access point, creating a
false access point, detect hidden SSIDs etc.
Long term goal of the project (part of the project which will be implemented in next semester) is
that once the security is breached and we are able to communicate with the victim we will try to
take over the control of the victims system and try to manipulate the data in his system.
Presentation I gave at DC207's regular meeting hosted at BlueTarp Financial (https://www.bluetarp.com).
The presentation is a quick overview to a group of industry professionals and university students (many of who have never done anything like this) of using the aircrack-ng suite of tools to crack WEP and WPA passwords. A sandboxed wireless network was setup and live demonstrations were done.
This document provides instructions for cracking a WEP network using Commview and Aircrack-ng. It explains that you need to use Commview to capture packets from the target network, saving at least 15,000 packets. These packets are then opened in Wireshark format and loaded into Aircrack-ng to crack the password. Following the steps allows initialization vectors to be collected from the packets in order to crack the WEP key.
This project aims at cracking the Wi-Fi security(WEP,WPA-personal).It basically includes
intrusion in a BSS(Basic Service Set),monitoring the traffic in air, manipulate SSIDs, get details
of clients on a particular SSID, sniffing the packets to & from them to Access point, creating a
false access point, detect hidden SSIDs etc.
Long term goal of the project (part of the project which will be implemented in next semester) is
that once the security is breached and we are able to communicate with the victim we will try to
take over the control of the victims system and try to manipulate the data in his system.
Presentation I gave at DC207's regular meeting hosted at BlueTarp Financial (https://www.bluetarp.com).
The presentation is a quick overview to a group of industry professionals and university students (many of who have never done anything like this) of using the aircrack-ng suite of tools to crack WEP and WPA passwords. A sandboxed wireless network was setup and live demonstrations were done.