Content deleted Content added
Adding short description: "Method for breaching computer network security" |
No edit summary |
||
Line 18:
===Decrypting===
Decryption often requires 2 tools; 1 for gathering packets and another for analysing the packet and determining the key. Gathering packets may be done through tools such as [[WireShark]] or Prismdump and cracking may be done through tools such as WEPCrack,
When gathering packets, often a great amount of them are required to perform cracking. Depending on the attack used, 5-16 million frames may be required. The attack command itself, however, is surprisingly simple.
Line 25:
Commands to be inputted into WEPCrack are:
<syntaxhighlight lang="console">
$ perl \progra~1\wepcrack\pcap-getIV.pl
</syntaxhighlight>
This command generates a log-file (ivfile.log) from a captured packet obtained by WireShark or prismdump A packet with at least 5 million frames is required.
<syntaxhighlight lang="console">
$ perl \progra~1\wepcrack\wepcrack\.pl ivfile.log
</syntaxhighlight>
This command asks WEPCrack to determine the key from the log file.<ref>{{Cite book |last=Beaver |first=Kevin |title=Hacking Wireless Networks
====AirCrack====
Line 39 ⟶ 43:
====AirSnort====
AirSnort is a software program that passively collects traffic on an
A comparison of the tools noted above may be found at [https://web.archive.org/web/20060408114100/http://www.securityfocus.com/infocus/1814 Security Focus].▼
==References==
{{reflist}}
==External links==
▲* A comparison of the tools
[[Category:Computer network security]]
[[Category:Wireless networking|Security]]
{{Network-stub}}
|