Understanding the wireless encryption WEP intrusion process and improving security awareness (I)

Source: Internet
Author: User

For wireless network security, WEP encryption is an important line of defense. wireless encryption of WEP intrusion is an important means for hackers to attack wireless networks. They often use software to crack networks, this series of articles will introduce how hackers use wireless encryption to crack the WEP intrusion. Instead, we will take active and effective preventive measures.

I. Features of implementing wireless encrypted WEP intrusion:

As we all know, the user needs to receive a sufficient number of WEP verification packets through listening and other methods, and then restore the plaintext information of the WEP encryption key using brute force cracking methods by analyzing the software. This method is also required to implement wireless encrypted WEP intrusion in five minutes. However, the difference is that traditional WEP encryption and cracking methods require attackers to use professional intrusion CDs such as BT3 and BT4, you can use a wireless scan and crack CD to start a GUI for a Linux operating system, and then use a built-in cracking tool to scan and restore keys. On the one hand, the operation is limited, you cannot flexibly select applications on the GUI interface. On the other hand, you need to download several GB of Cracked CD images and burn them to a CD for startup. The most critical point is that such cracking does not support resumable cracking. That is to say, if the power is turned off or the cracking is stopped halfway, the previous work will be abandoned.

The five-minute wireless encrypted WEP intrusion method introduced by the author effectively addresses the shortcomings of the traditional method above. First, we do not need to download a large data disk, secondly, all the work is completed directly in the Windows system, with all graphical interfaces. In addition, we can divide the work into two stages: data collection and data cracking, which greatly improves the cracking Efficiency, implements the resumable upload function. Through the methods described in this article, we can collect the WEP verification data packets within a short period of time, and then perform the brute force cracking and restoration of WEP. In general, cracking WEP-encrypted wireless network speed is even more.

2. Change the wireless NIC Driver for data monitoring:

Similar to the previous intrusion into wireless encryption WEP, we first need to update our wireless NIC Driver, because by default, although the wireless Nic can communicate wirelessly, however, it is not competent for listening. The procedure is as follows.

Step 1: The notebook I use is IBM T400. By default, his wireless network adapter is the atheros ar5006 series. We need to change it to a suitable monitoring category. First, find the wireless network adapter under the network adapter in my computer task manager, right-click it and select "Update driver ".

Step 2: In the hardware Installation Wizard, select "install advanced from list or specified location)" and click "Next" to continue.

Step 3: select the driver. Use the file in the "driver" directory in the attachment to install the driver. Click "Browse" to find the corresponding NIC Driver, click "Next.

Step 4: the system automatically scans the specified directory and updates the NIC Driver through the driver file.

Step 5: After the update is completed, our wireless network adapter will be changed to commview atheros ar5006x wireless network adapter. Click "finish" to complete.

Step 6: query the NIC again and you will see that the name has been successfully updated to commview atheros ar5006x wireless network adapter.

So far, we have completed the update of the driver, and now the wireless network card of our notebook has the function of listening to wireless communication data packets. Now we can monitor wireless data packets through professional monitoring software.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.