Network encryption cracking: Difference between revisions

Content deleted Content added
SmackBot (talk | contribs)
m Date maintenance tags and general fixes
m sp
Line 2:
{{Refimprove|date=October 2008}}
 
'''Network encryption cracking''' is the breaching of network encrptionsencryptions (eg. WEP, WPA, ...), usually trough the use of a special [[Wireless security|encryption cracking software]]. It may be done through a range of attacks (active and passive) including injecting traffic, decrypting traffic, and [[Dictionary attack|dictionary-based attacks]].
 
==Methods==
Line 12:
 
===Injecting traffic===
Injecting traffic means inserting forged encrypted messages into the network. It may be done if either the key is known (to generate new messages), but also if the key is not known and only a encrypted message and plaintext message is gathered, trough comparisationcomparison of the two. Programs able to do the latter are [[Aireplay]] and [[WepWedgie]].
 
===Decrypting===
Line 31:
 
====AirCrack====
Aircrack is another program that's even simpler to use, as no command need to be entered; instead the user is asked to type in some parameters and click some buttons.
 
First airodump is started to gather the packets; herefore channel and MAC-filter are asked, yet the user does not need to know them per se (instead 0 and p may be inputted respectively). Then, airacrkAirCrack is started, the file just created by airodump is accessed, a 0 needs to be entered and the program determines the key.
 
====AirSnort====
AirSnort is an even simpler program, as it is completely interface-based. As the attack is only a simple brute-force attack however, cracking the encryption can take a while (from several days to a few weeks). Especially if traffic is low (only 4 users or so on network, the cracking will take atleastat least 2 weeks).
 
==Comparison of tools==
A comparisationcomparison of the tools noted above may be found at [http://www.securityfocus.com/infocus/1814 Security Focus].
==References==