Alternative Wi-Fi Cracking
Devices like video game consoles, camera, mobile etc. which have Wi-Fi functionality can connect to internet by using any wireless access point. Such an access point has a range of about 20 meters (65 feet) indoors and a greater range outdoors. Below is an example of an outdoor wireless access point.
-
WEP : The term WEP refers for Wired Equivalent privacy, It is used as a security code for securing wireless networks.The length of a WEP key depends on the type of WEP security utilized:
It is a simple sequence of hexadecimal digits which includes the numbers 0-9 and the letters A-F.
i) 40-/64bit WEP: 10 digit key
ii) 104-/128bit WEP: 26 digit key
iii) 256bit WEP: 26 digit key
-
WPA :
WPA is a short term for Wi-Fi Protected Access was developed by the networking industry in response to the weaknesses of WEP.
WPA is called the secure encryption method the reason behind this is that WPA has a function of message integrity check which prevents an attacker from capturing, altering or resending data packets.
WPA provides stronger encryption than WEP through use of either of two standard technologies: Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).
A variation of WPA designed for use on home networks is called WPA Pre Shared Key or WPA-PSK for short. WPA-PSK is a simplified but still powerful form of WPA. Now WPA has been replaced by WPA2 which is more secure and reliable.
Tools required: 1] CommView for Wi-Fi
2] Aircrack-ng (Windows based)
Now open your “CommView” for Wifi and go to “file option” and click on “file capture” like shown in the figure below:
After that a new window appears and then click on “start scanning”.
After scanning its shows the list of all channels and the wireless networks which are running on specified channels as shown in the figure below:
In the above figure I selected a network which is running on channel 6.For details see the right side of the window, it shows the network encryption type, SSID and MAC address. Then click on “capture” and wait for the packet data. You have to create a minimum of 5000 packets for cracking a WEP key. When the numbers of packets are high, it’s easier for you to crack the key as shown in the figure below:
When sufficient packets create the “go to file option”, click on “stop capture”.
After the capturing process is complete, it creates a log file in the “log folder”. You can check your log folder directory by clicking on “log tab”. In the figure below it shows the directory of “my log folder” which is in “my documents/CommView for Wifi/Logs”.
Now go to the log folder there you can see a capture file like shown in the figure below:
Want to learn more?? The InfoSec Institute Ethical Hacking course goes in-depth into the techniques used by malicious, black hat hackers with attention getting lectures and hands-on lab exercises.
While these hacking skills can be used for malicious purposes, this
class teaches you how to use the same hacking techniques to perform a
white-hat, ethical hack, on your organization. You leave with the
ability to quantitatively assess and measure threats to information
assets; and discover where your organization is most vulnerable to black
hat hackers. Some features of this course include:
- Dual Certification - CEH and CPT
- 5 days of Intensive Hands-On Labs
- Expert Instruction
- CTF exercises in the evening
- Most up-to-date proprietary courseware available
Now just double click on the file and a new window appears, then go to “file option” select “export logs” then select “Wireshark/Tcpdump format” and save your file. Here I save my file name as “hack.cap” in my desktop shown in the figure below:
Now open your “Aircrack GUI” and browse for your saved capture file as shown in the figure below:
After that click on the “launch button” then a cmd window appears, asking for index no. of target network here my target network index no. is 1 like shown in the figure below:
After putting in your index number, press “enter” and the cracking process starts, if the key is decrypted successfully like shown in the figure below:
CONCLUSIONS: Hence we conclude that the WEP key is not secured. If we create a 256 bit key that can also be cracked, but that is time consuming and we have to capture a higher number of packets and data.
REFERENCES:
http://www.squidoo.com/what-is-wifi
http://mobileoffice.about.com/od/glossary/g/wi-fi.htm
http://en.wikipedia.org/wiki/Wi-Fi
http://compnetworking.about.com/od/wirelesssecurity/f/what-is-a-wireless-key.htm
http://compnetworking.about.com/od/wirelessfaqs/f/wep_keys.htm
http://compnetworking.about.com/cs/wirelesssecurity/g/bldef_wpa.htm
0 Comments:
Post a Comment
Subscribe to Post Comments [Atom]
<< Home