Network encryption cracking: Difference between revisions

Content deleted Content added
m Undid revision 244640010 by 82.31.144.96 (talk)
Needs a lot of clean up
Line 1:
{{Template:Cleanup}}
Network encryption cracking is the breaching of network encrptions (eg WEP, WPA, ...), usually trough the use of a special [[Wireless security|encryption cracking software]]. It may be done trough a range of attacks (active and passive) including injecting traffic, decrypting traffic and dictonary-based attacks.
{{refimprove}}
 
Network encryption cracking is the breaching of network encrptions (eg. WEP, WPA, ...), usually trough the use of a special [[Wireless security|encryption cracking software]]. It may be done troughthrough a range of attacks (active and passive) including injecting traffic, decrypting traffic, and dictonary[[Dictionary attack|dictionary-based attacks]].
 
==Methods==
Line 12 ⟶ 15:
 
===Decrypting===
Decryption often requires 2 tools; 1 for gathering packets and another for analysing the packet and determining the key. Gathering packets may be done troughthrough tools as [[WireShark]], [[Prismdump]], ... and cracking may be done troughthrough tools such as [[WEPCrack]], [[AirSnort]], [[AirCrack]], and [[WEPLab]], ...
 
When gathering packets, often a great amount of them are required to perform cracking. Depending on the attack used, 5-16 million frames may be required. The attack- command itself, however, is surprisingly simple. Some examples:
 
====WEPCrack====
Commands to be inputted into WEPCrack are: <br />
 
perl \progra~1\wepcrack\pcap-getIV.pl <br />
This command generates a log-file (ivfile.log) from a captured packet obtained by WireShark or prismdump A packet with atleast 5 million frames is required. <br />
 
perl \progra~1\wepcrack\wepcrack\.pl ivfile.log <br />
This command generates a log-file (ivfile.log) from a captured packet obtained by WireShark or prismdump A packet with atleast 5 million frames is required. <br />
This command asks WEPCrack to determine the key from the log-file
 
<ref>Hacking Wireless Networks for Dummies</ref>
perl \progra~1\wepcrack\wepcrack\.pl ivfile.log <br />
 
This command asks WEPCrack to determine the key from the log- file.<ref>Hacking Wireless Networks for Dummies</ref>
 
====AirCrack====
Line 32 ⟶ 38:
AirSnort is an even simpler program, as it is completely interface-based. As the attack is only a simple brute-force attack however, cracking the encryption can take a while (from several days to a few weeks). Especially if traffic is low (only 4 users or so on network, the cracking will take atleast 2 weeks).
 
==ComparisationComparison of tools==
A comparisation of the tools noted above may be found at [http://www.securityfocus.com/infocus/1814 Security Focus].