Network encryption cracking: Difference between revisions

Content deleted Content added
Adding short description: "Method for breaching computer network security"
No edit summary
Line 18:
 
===Decrypting===
Decryption often requires 2 tools; 1 for gathering packets and another for analysing the packet and determining the key. Gathering packets may be done through tools such as [[WireShark]] or Prismdump and cracking may be done through tools such as WEPCrack, [[AirSnort]], AirCrack, and WEPLab.
 
When gathering packets, often a great amount of them are required to perform cracking. Depending on the attack used, 5-16 million frames may be required. The attack command itself, however, is surprisingly simple.
Line 25:
Commands to be inputted into WEPCrack are:
 
<syntaxhighlight lang="console">
$ perl \progra~1\wepcrack\pcap-getIV.pl
</syntaxhighlight>
 
This command generates a log-file (ivfile.log) from a captured packet obtained by WireShark or prismdump A packet with at least 5 million frames is required.
 
<syntaxhighlight lang="console">
$ perl \progra~1\wepcrack\wepcrack\.pl ivfile.log
</syntaxhighlight>
 
This command asks WEPCrack to determine the key from the log file.<ref>{{Cite book |last=Beaver |first=Kevin |title=Hacking Wireless Networks forFor Dummies |last2=Davis |first2=Peter |publisher=[[For Dummies]] |year=2005 |isbn=978-0764597305 |edition=1st}}</ref>
 
====AirCrack====
Line 39 ⟶ 43:
 
====AirSnort====
AirSnort is a software program that passively collects traffic on an even[[IEEE simpler802.11b]] programnetwork. After enough packets have been collected, asthe itprogram iscan completelythen interface-basedcompute the key for the wireless network. As the attacksoftware ismakes onlyuse a simpleof brute-force attack however, cracking the encryption can take between a whilefew (fromhours to several days, tobased aon fewthe weeks).activity Especiallyon ifthe trafficnetwork.<ref>{{Cite isweb low|title=AirSnort (onlypokes 4holes usersin or so onAirPort network, thesecurity cracking|url=https://www.macworld.com/article/162585/airsnort.html will|access-date=2023-01-16 take|website=Macworld at least 2 weeks).|language=en}}</ref>
 
==Comparison of tools==
A comparison of the tools noted above may be found at [https://web.archive.org/web/20060408114100/http://www.securityfocus.com/infocus/1814 Security Focus].
==References==
{{reflist}}
 
==External links==
* A comparison of the tools notedlisted above may be found at [https://web.archive.org/web/20060408114100/http://www.securityfocus.com/infocus/1814 Security Focus].
 
[[Category:Computer network security]]
[[Category:Wireless networking|Security]]
 
{{Network-stub}}