aircrack

We need to capture the WPA 4 way handshake in order to perform an offline GPU attack. For this demo we’ll be using an Alfa AWUS036H wireless card under Backtrack 5 R2 64bit.

Now I could go in depth about capturing the WPA handshake manually using aircrack-ng but it has been covered in full in many places already, so instead im going to use a great python tool call… Continue reading

I have wrote an automated WEP cracking script (matts-wepcrack.sh). Let me know if you have any improvements.

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134#!/bin/bash # wepcrack.sh v1.3 # Create by Matthew Phillips # New versions can be downloaded from www.phillips321.co.uk VERSION="1.3" # # This tool requires aircrack-ng tools to be installed and run as root # # ChangeLog.... # Version 1.3 - Randomises interface MAC address # Version 1.2 - Set txpower of card to 1000mw… Continue reading

Run the following in the first terminal window to create an interface in monitor mode called mon0 of interface wlan0 The second command shows WEP encrypted networks nearby The third command starts capturing traffic from your target

123airmon-ng start wlan0 #create interface man0 in monitor mode of wlan0 airodump-ng --encrypt WEP mon0 #shows APs with WEP only airodump-ng -c [channel] --bssid [mac_of_ap] --ivs -w [filename] mon0

Now open a second… Continue reading