Content deleted Content added
A Meteorite (talk | contribs) m Undid revision 244640010 by 82.31.144.96 (talk) |
A Meteorite (talk | contribs) Needs a lot of clean up |
||
Line 1:
{{Template:Cleanup}}
Network encryption cracking is the breaching of network encrptions (eg WEP, WPA, ...), usually trough the use of a special [[Wireless security|encryption cracking software]]. It may be done trough a range of attacks (active and passive) including injecting traffic, decrypting traffic and dictonary-based attacks.▼
{{refimprove}}
▲Network encryption cracking is the breaching of network encrptions (eg. WEP, WPA, ...), usually trough the use of a special [[Wireless security|encryption cracking software]]. It may be done
==Methods==
Line 12 ⟶ 15:
===Decrypting===
Decryption often requires 2 tools; 1 for gathering packets and another for analysing the packet and determining the key. Gathering packets may be done
When gathering packets, often a great amount of them are required to perform cracking. Depending on the attack used, 5-16 million frames may be required. The attack
====WEPCrack====
Commands to be inputted into WEPCrack are:
perl \progra~1\wepcrack\pcap-getIV.pl
This command generates a log-file (ivfile.log) from a captured packet obtained by WireShark or prismdump A packet with atleast 5 million frames is required. <br />▼
perl \progra~1\wepcrack\wepcrack\.pl ivfile.log <br />▼
▲This command generates a log-file (ivfile.log) from a captured packet obtained by WireShark or prismdump A packet with atleast 5 million frames is required.
This command asks WEPCrack to determine the key from the log-file▼
▲This command asks WEPCrack to determine the key from the log
====AirCrack====
Line 32 ⟶ 38:
AirSnort is an even simpler program, as it is completely interface-based. As the attack is only a simple brute-force attack however, cracking the encryption can take a while (from several days to a few weeks). Especially if traffic is low (only 4 users or so on network, the cracking will take atleast 2 weeks).
==
A comparisation of the tools noted above may be found at [http://www.securityfocus.com/infocus/1814 Security Focus].
|