To those interested;
Here in my hotel room, I've set up a quick and dirty wireless security practice lab (I'm been on a WPA cracking kick lately). But I decided to review myself on WEP stuff first.
Things I'm using.
1 Toshiba Satellite M20 running Redhat 9
2 Toshiba Portege Tablet running Windows XP SP2.
3. A cheap Netgear WGR614 wireless router.
4. A cheaper linksys wireless router.
5. And (drumroll).........My PPC 6700 Pocket PC phone.
I've posted before about how cool the phone is, but now I'm really impressed as I have been able to easily set up a share on my laptop, and browse/copy files from that shared location via my phone, super cool.
Basic setup is as follows. I've get the Netgear bridged to the hotel's WLAN for internet access, (I got persmission first), both laptops connected to the netgear via wifi. PPC Phone is also connected via wifi. I'm using WPA-TKIP with a key that's about 14 characters (I know the reccomendation is 20, but i'm trying to make it easy on myself for now.

), and WEP with a simple key (yes you can use both contrary to popular belief). I'm using one laptop to act mainly as a peer to peer server (it's got the shared folders), and the other as a my sniffer/packet analyzer, and using my PPC Phone to actually browse the internet. For now I'm randomly browsing and then disconnecting and reconnecting (to see how often the WEP pre-shared key really gets pushed across the airwaves), also I'm using packet injection to create traffic (my analyzer shows all of the injected packets as fragmented and corrupted, hmmm, interesting). Also, I'm using MAC filtering to really keep myself out.
The tools I'm using include, Kismet, Airopeek, COMMView, Aircrack and Airmagnet.
Ok, here are my prelim findings (ahhh only about an hour into it right now). First of all, the MAC filtering was a non-issue, because the MAC's of all devices are being transmitted like crazy (thanks ARP). And COMMView picks them up like crazy (even though it says the packets, are encrypted, the MAC's are still visible after converting the captured packets to ASCII. Cracking the WEP key was extremely easy using the Whoppix Live Cd and simply taking notes from Hacking Defined's video "Cracking WEP in 10 Minutes". With the WEP keys, I was able to associate with AP and easily grab and decrypt all WEP traffic coming across. I needed to capture about 200 megs worth traffic (or so I thought). After Commview reached 220 meg, I went ahead and exported the log to text and used Aircrack to extract the key. The whole thing took about 45 minutes, however, If i was as versed in linux as I should be, it would have been much shorter (took me forever to get the right syntax in the frikin config file for my card).
So far what i've been able to do is....
Reconstruct the TCP and IP packets into html, so I was actually able to view the webpages that I'd browsed from my PPC in Commview (that's scary). Also I was able to Reconstruct a word document I copied from the shared drive on the "server" laptop. It wasn't pretty, but it worked. It basically lost all the formatting, and the words for jumbled and broken. Keep in mind when I say reconstruct, I didn't actually re-code anything, COMMview actually has a reconstruct command that will do this for you by basically trying to put the packets back in the order and sequence they were sent using only information sent in the packets. As far as any of the graphics on the webpages, none of em were able to be reconstructed. Hopefully, some of you will download some of these tools and use them. They are all free (except Commview which is about $550), and they all work pretty well. This is mostly stuff centered around advice from JD Murray on preparing for CWNA, CWSP, and CWAP exams which I'll be taking soon. So far so good, and I'm having much fun. Hope some of you join me soon.
See ya.
Keatron