Know yourself and know what the wireless network password is cracked

Source: Internet
Author: User
Tags netstumbler

Today, we will share with you how the WEP encryption mode is cracked. Our starting point is to protect our network.

Currently, users who still use the WEP password encryption mode either have little knowledge about wireless networks or are lucky enough to feel that WEP encryption should be enough to protect their networks. WEP supports 64-bit and 128-bit encryption. For 64-bit encryption, the key is 10 hexadecimal characters (0-9 and A-F) or 5 ASCII characters; for 128-bit encryption, the key is a string of 26 hexadecimal or 13 ASCII characters.

Data can be sent and received over wireless networks more easily. Therefore, encryption and authentication are two essential factors for a secure and stable wireless network. WEP (Wired Equivalent Privacy: (wired peer-to-peer) Protocol to set up a dedicated Security Mechanism for business flow encryption and node authentication. It is mainly used for the confidentiality of link layer information data in Wireless LAN. WEP adopts symmetric encryption mechanism, and data encryption and decryption adopts the same key and encryption algorithm. WEP uses an encryption key (also known as the WEP Key) to encrypt the data portion of each packet exchanged on the 802.11 Network.

Because wireless networks do not require network connections, we only need to enter the wireless network. We used software to crack the WEP encryption mode in wireless networks. First, we first use the NetStumbler software to detect wireless networks.

We can see that NetStumbler has found two wireless networks, and we can see a lot of information about this network. This stage is data collection. The red box determines that the AP with the SSID name demonalex is of the 802.11b type, and the Encryption attribute is 'encrypted '. Based on the algorithm standards supported by 802.11b, the algorithm is determined as WEP. Note that NetStumbler identifies any STA (802.11 Wireless site) that uses Encryption algorithms as the WEP algorithm on the Encryption attribute.

The purpose of this discussion is to capture appropriate data frames for IV (initialization vector) and obtain WEP keythrough brute-force cracking. Because of this, airodump.exe(capture data frame ratio and winaircrack.exe (crack wep key) are used together.

Open the ariodump program. First, the program will prompt all wireless network interface interfaces that currently exist on the local machine, and ask you to enter the ID of the wireless network interface to capture data frames, here we choose to use the buffalownic --- number '26' that supports the general-purpose driver, and then the program requires you to enter the chip type of the WNIC, at present, most international general-purpose chips use a subset of 'hermesi/Realtek '. Therefore, select 'O', and then enter the channel of the signal to be captured, the channel of the AP/wireless route to be captured is '6'. The system prompts you to enter the file name and location of the captured data frame. The file is stored in the installation directory of winaircrack by default. at the end of the cap, winaircrack prompts: 'Do you want to write/record only IV (initialization vector) to the cap file? ', Select 'no/N' here. After confirming the preceding steps, the program starts to capture data packets.

The following process takes a long time until the total number of 'packets 'columns in the table is 300000. When the communication data traffic of the AP/wireless route is extremely frequent and the data traffic is extremely high, the acceleration of the value corresponding to 'packets 'increases.

When the program runs to meet the requirements of 'packets '= 300000, press Ctrl + C to end the process. In the installation directory of winaircrack, you will find two files: last.capand last.txt. Then you can see the information.

The attack mainly targets last. cap. Run the winaircrack.exe file and click the folder button in the red box *. in the cap selection dialog box, select last. cap file, and then click the 'web' button on the right to switch the main interface to the Wep cracking option interface.

Select 'key size' as 64 (currently most users use the WEP Key of this length, so this step is entirely based on speculation to select this value), and finally click the Aircrack button at the bottom right of the main interface, A dialog box embedded in cmd is displayed, and the wep key is displayed.

We can see the cracked key from the cmd, which is our final goal. The rest is that we use our laptop to connect the SSID to the demonalex wireless network, then fill in the key we learned to crack Changyou network.

In fact, in addition to this, there are still a lot of software that can crack the WEP encryption mode: Kismet, a super wireless sniffer; GFI firewall ARD, a commercial network security scanner on Windows platforms; Airsnort, 802.11 WEP encryption and cracking tool. These software can be easily downloaded on the network, as long as there is enough time to capture the wireless network communication signal in the communication, attackers can crack wireless network security settings, such as WEP encryption, WPA encryption, MAC filtering, and SSID hiding.

Through the above demonstration, we can see that the current wireless technology development, WEP encryption mode can not completely protect our network security, while the current cash WPA or WPA2 encryption mode, they are commonly used and are also encrypted with higher security. Therefore, to protect the security of our wireless network, you must make enough settings. Let's work together to protect our network security.

 

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.