Top 3 Ways to Crack Wireless Networks

16Jul09

The cracking technique I addressed late last week required you to type in ten cumbersome commands that is easy to fat finger.  Although there is no simple user interface with a gigantic push button that states, “Crack” and plays the Mission Impossible theme music, a few windowed alternatives are practically more operable.

SpoonWep in BackTrack III

spoon wep cracker

With the aforementioned BackTrack III live compact disc or VMware image that I employed late last week, I got around virtually all of the commands you will pick up there and utilize SpoonWep as an alternative.  When you have rebooted into BackTrack III, from the KDE computer menu, select BackTrack—Radio Network Analysis—80211—Cracking—SpoonWep.  All that you’ll require to execute SpoonWep versus a Wi-Fi network is the BSSID and Channel SSID.

Access the BSSID in the “Victim Mac” area of SpoonWep.   Select your wireless fidelity adapter from the drop down menu list, adjust the channel, and then launch the attack.  Decrease or increase the injection range utilizing the slider.

Regarding the BackTrack IV pre-release, several commenters call attention that it tolerates many wireless cards and may crack passwords quicker than using aircrack ptw.  BT4 systematically freezes on me; however, I think it was the edition of the Alfa USB transcriber I was utilizing that induced the problem.

KisMAC for the Mac OS X

kismac mac os x wep cracking

Whenever you would like to acquire your crack on the Mac, download the complimentary KisMAC.  KisMAC can’t crack WEP on your standard built in Airport card; you will all the same, require a card that operates with a KisMAC device driver that supports bundle injection.  If you are utilizing an Alfa 500mw like I currently use, you will be able to utilize the standard USB RTL8187L driver.  From KisMAC’s Preferences drop down menu, add the device driver that works with the wireless adapter.  Scan for all of the networks and decide on the network you would like to crack.  Once you decide on the network, go to the Network drop down menu and choose “de-authenticate”.  As soon as the “Unique IVs” number is sufficient, choose Crack from the Network menu, and pick your attack.


Windows OS:  Aircrack-ng suite

From my vast experience, there is no non-command line software that you can set up on Windows to crack wireless encryption Protocol (WEP).  There are several tutorials on how to install the aircrack-ng suite for Windows and successfully running it.  I have tried a couple of them, but I quickly went back to BackTrack III.

Finally, You Recognize How to Safely Secure Your Wireless Network

Acknowledging how to crack wireless encryption protocol keys does not imply you go out and breach people’s wireless fidelity electronic networks.  It means that you have witnessed firsthand, precisely how “crackable” wireless encryption protocol keys are.  I have “acknowledged” for a long time now that the WPA is better than wireless encryption protocol, but the bridge on my electronic network offers WPA, but could not authenticate with it on my router.  It was not until I published my article last week where I acquired an updated working router.  That is the ability of examining something in action, where you have generally got to wade through blackhat internet sites.

This is an awkward matter, naturally, but thanks to every last one of you, the feedback thread from last week’s article enlightened a few of the finer points when it comes to wireless security.  To quickly recap:  Wireless encryption protocol does not in reality keep anybody away.  I appreciate MaribelAlligator’s equivalence of a wireless encryption protocol key to a home bedroom lock, the lock you can simply open by using a butter knife.  Everybody acknowledges how to unlock it, but when it is fastened, everybody that passes by realizes that they should stay out.  Glenn Fleishman equates WEP to a “Do Not Enter” sign.  A clear cut indicator that the people on the inside do not want you in, but nothing in reality will keep you out.

WPA is also “crackable”, but it is harder.  A wired electronic network is better secured than a wireless fidelity electronic network, as it is harder to link up to it.  If wiring your house is not an alternative, choose the WPA2 whenever possible.  As a lot of commenters remarked, WPA has been cracked in a few conditions as well, but it is not doe as easy as WEP.  To explain, MaribelAlligator continues with the “bedroom lock” analogy:

WPA is similar to your standard home door lock; it is a bit more secure, however, it’s all the same, easy to get in for someone with the knowledge, circumstances, and right tools.  WPA2 is equivalent to a safe at the bank.  It perhaps is conceivable to overcome, depending on how it is set up, although it is not realistically conceivable for anyone to actually do it, yet.

Filtering out MAC addresses and concealing SSID’s does not matter to those who would like to get in. A couple of commenters have stated that they have ceased transmitting their router’s SSID, and set up their MAC address filtering system that exclusively admits particular devices to associate to it. This criteria will bar those who do not recognize what they are doing, but not to those who do.

Not airing your SSID is similar to removing the address numbers off of a house.  The house is still there, and everybody can see it.  It is just a little harder to discover for those that do not know what they’re searching for already. Filtrating by MAC address is similar to having a bouncer at the main door that inspects everyone’s credentials against a list if they are allowed to enter. The sole problem is that the bouncer does not remember what people look like or call for identification, so anyone that can, will eavesdrop to hear what names are allowed in, and then admit to being the person on the bouncer’s list.

In conclusion, protect your material using several layers of protection. Whether your electronic network is wireless or wired, WPA, WPA2, or open, acquire a lot of measures to thoroughly secure your crucial stuff. Password your electronic network, perform malware and virus sweeps, run firewalls, and back up your data.  Do not swear totally on your wireless router’s password

If you have older devices that exclusively support WEP, you have to balance risk over reward. If your Play Station II only understands WEP, and you need wireless access, use the WEP while understanding what the dangers are located.

About these ads


13 Responses to “Top 3 Ways to Crack Wireless Networks”

  1. I really like what you guys tend to be up too. This kind of
    clever work and coverage! Keep up the terrific works guys
    I’ve included you guys to my personal blogroll.

  2. I’m truly enjoying the design and layout of your blog. It’s a very easy on the eyes which
    makes it much more enjoyable for me to come here
    and visit more often. Did you hire out a designer to create your theme?
    Excellent work!

  3. I think the admin of this site is really working hard in favor of his web page, for the reason that here
    every stuff is quality based stuff.

  4. I was suggested this website via my cousin. I’m not positive whether or not this publish
    is written via him as nobody else recognise
    such precise about my trouble. You are amazing!
    Thank you!

  5. What’s up mates, its wonderful article regarding tutoringand fully
    explained, keep it up all the time.

  6. Today, I went to the beachfront with my kids. I found a sea shell and
    gave it to my 4 year olld daughter and said “You can hear the ocean if you put this to your ear.”
    She placed tthe hell to her ear and screamed. There waas a hermit crab inzide and it pinched
    her ear. She never wants too go back! LoL I
    knoow this is entirely off topic but I had to ell someone!

  7. Hello, just wanted to mention, I liked this article. It was funny.
    Keep on posting!

  8. I read this piece of writing fully regarding the difference of newest and preceding technologies, it’s awesome article.

  9. I think that is among the so much important information for me.
    And i’m glad reading your article. However want to
    statement on few common issues, The web site style is perfect, the articles is
    truly nice : D. Excellent activity, cheers

  10. This site was… how do yoou say it? Relevant!! Finally I’ve found something thatt helped me.
    Cheers!

  11. I must thank yoou for the efforts you have put in penning this site.
    I am hoping to view the same high-grade content from you in the future as well.

    In truth, your creative writing abilities has inspired me to get my very
    own website now ;)

  12. Hello are using WordPress for your blog platform?
    I’m new to the blog world but I’m trying to get started and
    create my own. Do you need any coding knowledge to make your own blog?
    Any help would be greatly appreciated!


  1. 1 » Hidden RFID tags could mean end of bar-codes and lines at the checkout

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s


Follow

Get every new post delivered to your Inbox.

Join 313 other followers