Content deleted Content added
m sp |
destub |
||
(18 intermediate revisions by 14 users not shown) | |||
Line 1:
{{Short description|Method for breaching computer network security}}
{{
{{essay|date=August 2018}}
'''Network encryption cracking''' is the breaching of network encryptions (
==Methods==
Line 9 ⟶ 10:
* Injecting traffic based on known plaintext (active attack)
* Gathering traffic and performing brute force/dictionary based attacks
* Decrypting traffic using statistical analysis (passive attack)
===Injecting traffic===
Injecting traffic means inserting forged encrypted messages into the network. It may be done if either the key is known (to generate new messages),
===Decrypting===
Decryption often requires 2 tools; 1 for gathering packets and another for analysing the packet and determining the key. Gathering packets may be done through tools such as [[WireShark]]
When gathering packets, often a great amount of them are required to perform cracking. Depending on the attack used, 5-16 million frames may be required. The attack command itself, however, is surprisingly simple.
Line 22 ⟶ 23:
Commands to be inputted into WEPCrack are:
<syntaxhighlight lang="console">
$ perl \progra~1\wepcrack\pcap-getIV.pl
</syntaxhighlight>
This command generates a log-file (ivfile.log) from a captured packet obtained by WireShark or prismdump A packet with at least 5 million frames is required.
<syntaxhighlight lang="console">
$ perl \progra~1\wepcrack\wepcrack\.pl ivfile.log
</syntaxhighlight>
This command asks WEPCrack to determine the key from the log file.<ref>{{Cite book |last1=Beaver |first1=Kevin |title=Hacking Wireless Networks
====AirCrack====
Line 36 ⟶ 41:
====AirSnort====
AirSnort is a software program that passively collects traffic on an [[IEEE 802.11b]] network that was released in August 2001.<ref>{{Cite magazine |last=Delio |first=Michelle |title=Wireless Networks in Big Trouble |language=en-US |magazine=[[Wired (magazine)|Wired]] |url=https://www.wired.com/2001/08/wireless-networks-in-big-trouble/ |access-date=2023-01-16 |issn=1059-1028}}</ref> After enough packets have been collected, the program can then compute the key for the wireless network. As the software makes use of brute-force attack however, cracking the encryption can take between a few hours to several days, based on the activity on the network.<ref>{{Cite web |title=AirSnort pokes holes in AirPort network security |url=https://www.macworld.com/article/162585/airsnort.html |access-date=2023-01-16 |website=Macworld |language=en}}</ref>
A comparison of the tools noted above may be found at [http://www.securityfocus.com/infocus/1814 Security Focus].▼
==References==
{{reflist}}
==External links==
▲* A comparison of the tools
[[Category:Computer network security]]
|