On Windows, PTW attacks against WEP

Source: Internet
Author: User

Popular Windows cracking tools Cain and Abel have recently added support for PTW attacks and the ability to replay ARP packets (providing you with support for injecting AirPcap devices ). This device allows you to crack WEP at a speed similar to Aircrack-ng without using any command line tool. The only drawback is that you must use the AirPcap Nic adapter and do not implement advanced ChopChop and fragment attacks.

If you have installed the AirPcap Nic adapter and are in use, start Cain and click the Wireless tab. Then, select the AirPcap Nic adapter name from the drop-down list and click the Passive Scan button. Once the network you are interested in appears in the list, click the Stop button and lock the corresponding channel. Confirm that the ARP request packet injection option is displayed in the bottom list, and then click the Passive Scan button again. An example of this configuration is shown in.

Pay attention to the data packet counter. If ARP replay attacks are working, the counter should remain in the increasing status. If you are in trouble, you can right-click the client and then cancel the authentication. This will cause the client to reassociate and send an ARP request. Once the data packet counter increases to around 40000, click the Analyze button. Select the BSSID you are interested in, and then click the PTW Attack (PTW Attack) button. If everything goes well, you should see a "WEP Key Found !" (WEP Key found !) As shown in.

Password Attack Defense

The simplest way to defend against such attacks is to use wpa2. Therefore, suppliers have adopted many alternatives. These measures include preventing weak initial ratio vectors (which will slow down the attacks of the FMS, but not the new PTW) and injecting "Chaff" WEP packets to get rid of the password analysis used for derivative keys. The PTW attack reflects the completely unrelated nature of avoiding the weak key (weak IV avoidance) (they are completely useless). If you use this method to cross a network, airdecloak-ng can be used to filter out the "chaff" package.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.