Content deleted Content added
m WP:CHECKWIKI error fixes using AWB (11789) |
destub |
||
(12 intermediate revisions by 9 users not shown) | |||
Line 1:
{{Short description|Method for breaching computer network security}}
{{
{{
'''Network encryption cracking''' is the breaching of network encryptions (e.g., WEP, WPA, ...), usually through the use of a special [[Wireless security|encryption cracking software]]. It may be done through a range of attacks (active and passive) including injecting traffic, decrypting traffic, and [[Dictionary attack|dictionary-based attacks]].
Line 17 ⟶ 16:
===Decrypting===
Decryption often requires 2 tools; 1 for gathering packets and another for analysing the packet and determining the key. Gathering packets may be done through tools such as [[WireShark]]
When gathering packets, often a great amount of them are required to perform cracking. Depending on the attack used, 5-16 million frames may be required. The attack command itself, however, is surprisingly simple.
Line 24 ⟶ 23:
Commands to be inputted into WEPCrack are:
<syntaxhighlight lang="console">
$ perl \progra~1\wepcrack\pcap-getIV.pl
</syntaxhighlight>
This command generates a log-file (ivfile.log) from a captured packet obtained by WireShark or prismdump A packet with at least 5 million frames is required.
<syntaxhighlight lang="console">
$ perl \progra~1\wepcrack\wepcrack\.pl ivfile.log
</syntaxhighlight>
This command asks WEPCrack to determine the key from the log file.<ref>{{Cite book |last1=Beaver |first1=Kevin |title=Hacking Wireless Networks
====AirCrack====
Line 38 ⟶ 41:
====AirSnort====
AirSnort is a software program that passively collects traffic on an [[IEEE 802.11b]] network that was released in August 2001.<ref>{{Cite magazine |last=Delio |first=Michelle |title=Wireless Networks in Big Trouble |language=en-US |magazine=[[Wired (magazine)|Wired]] |url=https://www.wired.com/2001/08/wireless-networks-in-big-trouble/ |access-date=2023-01-16 |issn=1059-1028}}</ref> After enough packets have been collected, the program can then compute the key for the wireless network. As the software makes use of brute-force attack however, cracking the encryption can take between a few hours to several days, based on the activity on the network.<ref>{{Cite web |title=AirSnort pokes holes in AirPort network security |url=https://www.macworld.com/article/162585/airsnort.html |access-date=2023-01-16 |website=Macworld |language=en}}</ref>
A comparison of the tools noted above may be found at [http://www.securityfocus.com/infocus/1814 Security Focus].▼
==References==
{{reflist}}
==External links==
▲* A comparison of the tools
[[Category:Computer network security]]
|