The cracking below bt3/bt4 is classic. In that year, I also played the card King's high-power wireless network card, a word, which is troublesome. In addition to virtual machine or CD boot, I also needed a special network card, the key is that you get used to using windows. It's not easy to operate linux. In order to give a demonstration today, it is also simple to study the cracking of the win xp platform:
Cain and omnipeek.
I searched the internet and found a lot of methods to crack. There were at least three tools, AirPcap Nic and driver, and CACE driver. It was also complicated to use a series of software such as airodump, netstumbler, aireplay, and aircrack!
Here is the test procedure:
1. Start cain, switch to the wireless tab, select the network card, and click "active scan" to list all the ssid information, and write down the channel and frequency range to be cracked (used later)
2. start omni peek, capture-> start, go out to capture options, select wireless network adapter, and select frequency band in step 1 for number in step 802.11; Right-click the protocol on the Right of filter, and select "insert ", select "protocol filter" in the basket, and click the button to add the 802.11 wep protocol.
3. After saving OK, click "start capture" to start packet capture. Generally, the passwords of more than 0.1 million filtered packets can be cracked. After the passwords are stopped, they are saved in the dmp format.
4. return to cain again, enter cracker, click "802.11 capture" on the left, right-click "add to list insert" on the right to add the saved wep data packet, and then analyze the data under "analyze. The five-bit password corresponds to a 64-bit password.
In addition, if wpa includes wpa2, it can only be used for brute force attacks or rainbow table cracking. cain can be used anyway.