For wireless network security, WEP encryption is an important line of defense. wireless encryption of WEP intrusion is an important means for hackers to attack wireless networks. They often use software to crack networks, this series of articles will introduce how hackers use wireless encryption to crack the WEP intrusion. Instead, we will take active and effective preventive measures.
I. Features of implementing wireless encrypted WEP intrusion:
As we all know, the user needs to receive a sufficient number of WEP verification packets through listening and other methods, and then restore the plaintext information of the WEP encryption key using brute force cracking methods by analyzing the software. This method is also required to implement wireless encrypted WEP intrusion in five minutes. However, the difference is that traditional WEP encryption and cracking methods require attackers to use professional intrusion CDs such as BT3 and BT4, you can use a wireless scan and crack CD to start a GUI for a Linux operating system, and then use a built-in cracking tool to scan and restore keys. On the one hand, the operation is limited, you cannot flexibly select applications on the GUI interface. On the other hand, you need to download several GB of Cracked CD images and burn them to a CD for startup. The most critical point is that such cracking does not support resumable cracking. That is to say, if the power is turned off or the cracking is stopped halfway, the previous work will be abandoned.
The five-minute wireless encrypted WEP intrusion method introduced by the author effectively addresses the shortcomings of the traditional method above. First, we do not need to download a large data disk, secondly, all the work is completed directly in the Windows system, with all graphical interfaces. In addition, we can divide the work into two stages: data collection and data cracking, which greatly improves the cracking Efficiency, implements the resumable upload function. Through the methods described in this article, we can collect the WEP verification data packets within a short period of time, and then perform the brute force cracking and restoration of WEP. In general, cracking WEP-encrypted wireless network speed is even more.
2. Change the wireless NIC Driver for data monitoring:
Similar to the previous intrusion into wireless encryption WEP, we first need to update our wireless NIC Driver, because by default, although the wireless Nic can communicate wirelessly, however, it is not competent for listening. The procedure is as follows.
Step 1: The notebook I use is IBM T400. By default, his wireless network adapter is the atheros ar5006 series. We need to change it to a suitable monitoring category. First, find the wireless network adapter under the network adapter in my computer task manager, right-click it and select "Update driver ".
Step 2: In the hardware Installation Wizard, select "install advanced from list or specified location)" and click "Next" to continue.
Step 3: select the driver. Use the file in the "driver" directory in the attachment to install the driver. Click "Browse" to find the corresponding NIC Driver, click "Next.
Step 4: the system automatically scans the specified directory and updates the NIC Driver through the driver file.
Step 5: After the update is completed, our wireless network adapter will be changed to commview atheros ar5006x wireless network adapter. Click "finish" to complete.
Step 6: query the NIC again and you will see that the name has been successfully updated to commview atheros ar5006x wireless network adapter.
So far, we have completed the update of the driver, and now the wireless network card of our notebook has the function of listening to wireless communication data packets. Now we can monitor wireless data packets through professional monitoring software.