Network encryption cracking: Difference between revisions

Content deleted Content added
Reverted edits by 87.64.196.170 (talk) using MWT
Line 16:
When gathering packets, often a great amount of them are required to perform cracking. Depending on the attack used, 5-16 million frames may be required. The attack-command itself however is surprisingly simple. Some examples:
 
====WEPCrackWepcrack====
will be added in couple hours .... ;)
Commands to be inputted into WEPCrack are:
<nowiki>perl \progra~1\wepcrack\pcap-getIV.pl <br />
This command generates a log-file (ivfile.log) from a captured packet obtained by WireShark or prismdump A packet with atleast 5 million frames is required. <br />
perl \progra~1\wepcrack\wepcrack\.pl ivfile.log <br />
This command asks WEPCrack to determine the key from the log-file
</nowiki>
 
====AirCrack====
Aircrack is another program that's even simpler to use as no command need to be entered; instead the user is asked to type in some parameters and click some buttons.
 
First airodump is started to gather the packets; herefore channel and MAC-filter are asked, yet the user does not need to know them per se (instead 0 and p may be inputted respectively). Then, airacrk is started, the file just created by airodump is accessed, a 0 needs to be entered and the program determines the key.
 
====AirSnort====
AirSnort is an even simpler program, as it is completely interface-based. As the attack is only a simple brute-force attack however, cracking the encryption can take a while (from several days to a few weeks). Especially if traffic is low (only 4 users or so on network, the cracking will take atleast 2 weeks).
 
==Comparisation of tools==
A comparisation of the tools noted above may be found at [http://www.securityfocus.com/infocus/1814 Security Focus].
==References==
{{reflist}}
 
[[Category:Computer network security]]
[[Category:Wireless networking|Security]]