Popular Windows cracking tools Cain and Abel have recently added support for PTW attacks and the ability to replay ARP packets (providing you with support for injecting AirPcap devices ). This device allows you to crack WEP at a speed similar to Aircrack-ng without using any command line tool. The only drawback is that you must use the AirPcap Nic adapter and do not implement advanced ChopChop and fragment attacks.
If you have installed the AirPcap Nic adapter and are in use, start Cain and click the Wireless tab. Then, select the AirPcap Nic adapter name from the drop-down list and click the Passive Scan button. Once the network you are interested in appears in the list, click the Stop button and lock the corresponding channel. Confirm that the ARP request packet injection option is displayed in the bottom list, and then click the Passive Scan button again. An example of this configuration is shown in.
Pay attention to the data packet counter. If ARP replay attacks are working, the counter should remain in the increasing status. If you are in trouble, you can right-click the client and then cancel the authentication. This will cause the client to reassociate and send an ARP request. Once the data packet counter increases to around 40000, click the Analyze button. Select the BSSID you are interested in, and then click the PTW Attack (PTW Attack) button. If everything goes well, you should see a "WEP Key Found !" (WEP Key found !) As shown in.
Password Attack Defense
The simplest way to defend against such attacks is to use wpa2. Therefore, suppliers have adopted many alternatives. These measures include preventing weak initial ratio vectors (which will slow down the attacks of the FMS, but not the new PTW) and injecting "Chaff" WEP packets to get rid of the password analysis used for derivative keys. The PTW attack reflects the completely unrelated nature of avoiding the weak key (weak IV avoidance) (they are completely useless). If you use this method to cross a network, airdecloak-ng can be used to filter out the "chaff" package.