Understand the wireless encryption WEP intrusion process and improve security awareness (3)

Source: Internet
Author: User

In the previous two articles, "Understanding the wireless encryption WEP intrusion process and improving security awareness" (I) ii), we introduced three steps for the penetration of wireless encryption WEP, now is the last step to crack the WEP Key. So the specific operation to this step is relatively simple, but also for you to make a simple summary.

4. Use aircrack to crack the WEP key:

We use the aircrack software to wirelessly encrypt the data collected by the WEP intrusion cracking to restore the WEP key. The author uses the aircrack-ng GUI software. The related software is provided in the attachment. Interested readers can download it by themselves.

Step 1: Start the aircrack-ng GUI main program and select the first tab on the left.

Step 2: Click the CHOOSE button to select the previously saved TCPDUMP file with the suffix CAP.

Step 3: Click the LAUNCH button in the lower-right corner to analyze the monitored data packets. The software will list all the related wireless network parameters based on the monitored data information. here we need to select the one with the highest IVS value, this is the wireless network we want to crack, such as we2017119ivs ).

Step 4: enter a sufficient number of network IDS corresponding to IVS and then automatically enter the wireless encrypted WEP intrusion brute-force cracking link. Then we need to wait patiently. If the number of IVS is not enough, a FAILED prompt will appear, which means we need to increase the number of monitored packets.

Step 5: if the number of WAP attacks is met, the key found prompt will appear after a while, we can successfully crack the WEP encryption key used by the target wireless network, thus achieving the goal of wireless encryption WEP intrusion.

Step 6: we can connect to the target wireless network smoothly through the scanned SSID information and WEP Key.

V. Summary:

This article describes how to use a boot disc in a Windows environment to directly encrypt WEP without using a boot disc. This method has two main features, the whole process of the first attack is completed directly in a WINDOWS environment. We can monitor data packets while surfing the Internet and no longer need to burn the boot disc; the second attack is completed through the collected data packets, so we can separate the attack and collection work, so that the wireless encryption and WEP intrusion cracking operations are more flexible, this method can be used in batches to complete the WP intrusion cracking of wireless encryption. Third, compared with the WEP verification content in the traditional passive monitoring wireless communication data packets, This method takes the initiative to attack, by copying WEP verification data packets and repeatedly sending false data packets to obtain feedback information, a sufficient number of WEP verification data packets are collected in the shortest time, in the end, the cracking speed of wireless encrypted WEP intrusion is greatly improved. For ordinary users, WEP encryption is no longer secure. Only other encryption methods such as WPA and WPA2 can ensure the privacy of wireless network communication, therefore, we hope that wireless network users will pay enough attention to this article to reduce the number of wireless network applications encrypted by WEP. After all, for intruders, WEP encryption is just a half-open door.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.