Understand the wireless encryption WEP intrusion process and improve security awareness (2)

Source: Internet
Author: User

The first two steps of wireless encrypted WEP intrusion are described in the previous article "Understanding the wireless encrypted WEP intrusion process and improving security awareness 1, you have learned about the process before cracking wireless network packets, so I will not repeat it here. Please refer to the complete content in this article 。

3. Install commview for wifi and collect related wireless communication data packets:

To smoothly monitor wireless communication data packets, in addition to using dedicated wireless encryption WEP to intrude into and crack the disc BT3 or BT4, we can do this through software in a WINDOWS system, this is also one of the main tools introduced in this article to quickly crack WEP encryption. He is the famous commview for wifi 。

Commview for wifi small files

Software Version: 6.1 build 607

Software size: 9881KB

Software type: shared version

Software language: English version

Applicable platforms: windows 9X/ME/NT/2000/XP/2003

: Http://www.onlinedown.net/soft/4632.htm

Step 1:Download commview for wifi 6.1 build 607 from the Internet. It is worth noting that you must select the for wifi version. Otherwise, you will not be able to monitor the wireless communication package smoothly. decompress the package and run the main installer, click next until all the installation is complete 。

Step 2:Next, start the commview for wifi software, click the "Arrow" (start monitoring) button on the main interface, and then open the scan interface, next, click the start scanning button on the right to scan the wireless network in the current environment. The scan starts from Channel 1 to channel 13, therefore, the scanned wireless network SSID, device category, and other information are directly displayed on the dig scan interface. After clicking the corresponding name, we can see the specific information, including the signal strength, the MAC address and IP address of the device 。

TIPS:

Because not every channel has many wireless networks in actual use, we can directly set a specific scan channel under the options tab, for example, to scan only channels 3, 6, in this way, you can increase the scanning speed to the maximum extent 。

Step 3:In fact, I still have a good way to determine which scan channel has the most wireless network, that is, through a dedicated fast wireless scanning tool, I use wirelessmon Professional Edition, with this tool, we can know in a few seconds which wireless networks exist in the current environment, including those that do not enable SSID broadcast, at the same time, they know the signal frequency band they are using, so as to determine which band has the most wireless network, and then return to the community scan of commview for wifi for corresponding settings 。

Step 4:Generally, data monitoring for wireless networks should not monitor multiple different wireless networks at the same time. Otherwise, there will be more wireless communication packets, which is not easy to filter, on the other hand, it also greatly reduces the cracking speed of the final wireless encryption WEP intrusion. Therefore, we can add the MAC address of the wireless network device to be monitored through the rules tag in commview for wifi to the filtering information, at the same time, specify whether the monitoring traffic direction is outbound, inbound, or all communications. Generally, we recommend that you use the communication both in all directions. After adding the MAC address, select enable mac address rules. monitor and record the data of the wireless network enabled for the MAC device 。

Step 5:After filtering information is set, click capture on the scacnner scan page to capture the information. Then we will see all the wireless data packets scanned by commview for wifi, including the frequency band and the corresponding wireless network SSID information 。

Step 6:After a period of proper monitoring, we click the packets packet label, all the monitored wireless communication data packets are displayed here. To better view and filter data information, click the rightmost button in the row below, that is, the button corresponding to the first word of the 18742 data packet is displayed 。

Step 7:After opening the log viewer interface, we can arrange data packets according to the protocol. Here we find the marked blue and the protocol name is encr. this is the data packet we want to analyze. Only through this data packet can we successfully use wireless encryption to crack the WEP and restore the WEP encryption key 。

Step 8:After selecting the data packet, right-click and choose send packet (s)-> selected to copy and send the data packet 。

Step 9:Then the packet sending window is automatically opened. Here, we only need to modify the number of times. Generally, we need to collect hundreds of thousands of packets to easily crack the attack, I usually select 0.8 million data packets and then wirelessly encrypt the WEP intrusion cracking. Click the "send" button to start sending the copied data packets in sequence. The number of sent data packets is also displayed below 。

Step 10:After sufficient data packets are collected, we return to the LOGGING log tag in the commview for wifi main interface. Here, we SAVE the log tag to a file with the NCF suffix by clicking the "save as" button 。

Step 2:Next, double-click the saved NCF file and the file will be automatically opened using the log viewer log browsing tool. here we can see all the captured data packets, click export logs-> tcpdump format in FILE to convert it to the TCPDUMP format. Only this format can be supported by the tools mentioned in the following wireless encrypted WEP intrusion brute-force cracking 。

After a new TCPDUMP file is generated, we can capture and monitor the data packets. Next, we can use wireless encryption to encrypt the WEP intrusion brute force cracking method to restore the WEP Key 。

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.