Intel 3945ABG uses OmniPeek 4.1 to capture packets and crack WEP

Source: Internet
Author: User

Objective: To crack WEP Encryption
Testing System: WINXP/SP2
Wireless Network Adapter: Intel PRO/Wireless 3945ABG
Testing Software: Network Stumbler, OmniPeek 4.1, and WinAircrack
Test server: DELL 640 M

1. First, you should first use the Network Stumbler software to find out the frequency band of the signal you want to crack and the MAC address of the AP, that is, the 12-bit value at the beginning of the software.


2. Replace Intel PRO/Wireless 3945ABG
Upgrade the driver to 10.5.1.72 or 10.5.1.75. Disable the software installed.


3. If the WildPackets API of the OmniPeek 4.1 software is displayed as YES, it indicates that the network card has been properly recognized.

Microsoft. NET Framework 2.0
(Install Microsoft. NET Framework 2.0 and then install WildPackets OmniPeek Personal 4.1) [/B]
WildPackets OmniPeek Personal 4.1 STRONG>


4. If we only capture WEP data packets, set to allow only WEP data packets to be captured. Press ctrl + M to open the Filter list without the "802.11 WEP Data" filter item. We can add a "802.11 WEP Data filter item" and click green "10" in the upper left corner.


5. Input "802.11 wep data" in the Filter, select "802.11 wep data" in "protocol filter", and tick "protocol filter ".


6. Then we need to set the memory cache size, General-Buffer size, and adjust it to MB (this step is very heavy or else we need to capture many packets ).


7.802.11 set the signal channel and input the MAC address of the ap in the bssid (why only set the MAC address of the AP? It is useless to set the SSID in the case of multiple APs with the same name SSID)


8. Check "801.11 WEP Data" in the "Filters" option to capture only 801.11 WEP packets and remove unwanted packets. Click OK.


9. Click the "start capture" button on the right of the bar to start packet capture.


10. If you accidentally click "stop capture" during the packet capture process, you can press the "shift" key and click "start capture" to capture the packet. If the Packet Volume cannot be reached, you can save the packet for next loading and cracking. After the packet capture is complete, click "start capture" and press "ctrl + S" to save it.



11. Save it as DMP format.


WinAircrackPack
12. Open WinAircrack and open the DMP file that you just saved. you can load packet capture data several times together.


13. Select 64-bit encryption. If you are not sure about 64-bit encryption, click OK.


14. Select the one you want to crack. Here we can choose to see the maximum value of IVS.


15. Crack WEP64-bit encryption.
 

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.