WEP Cracking

Hello,
I wanted to do a setup where I creat a WEP network having one or 2 users and I use my wireless laptop to sniff and crack the WEP. I just had a few questions. I downloaded the backtrack cd from remote-exploit. Are there any tutorials I can get to be able to do this? My idea is to be able to show that WEP is weak and WPA and 802.1x is a much better solution. Could you please give me a push in the right direction for this. Also if I have such a small setup, how can I have more date being sent to simulate a larger network with more data being passed so the WEP cracking can be faster?
Cheers,
Debrat
I wanted to do a setup where I creat a WEP network having one or 2 users and I use my wireless laptop to sniff and crack the WEP. I just had a few questions. I downloaded the backtrack cd from remote-exploit. Are there any tutorials I can get to be able to do this? My idea is to be able to show that WEP is weak and WPA and 802.1x is a much better solution. Could you please give me a push in the right direction for this. Also if I have such a small setup, how can I have more date being sent to simulate a larger network with more data being passed so the WEP cracking can be faster?
Cheers,
Debrat
Comments
I suggest a forum mod lock this thread for example.
I wouldn't consider sniffing your own network in a lab environment for proof-of-concept an out of bounds discussion, but maybe I'm wrong.
This is actually taught as material on the CEH course.
If you google knoppix wep crack video there is a cool tutorial on how to do it.
I think in essance it involves capturing packets with the valid wep encryption data then you play them back at the access point. (i think you need to spoof the mac of a valid host)
This then allows you to capture enough packets to use something like aircrack to recover the wep key.
People that know the mechanics well can do the whole process in about 10 minutes.
Sorry its vague but that is the jist of it.
Who fed you that crap?
Its as legal as breathing to crack your own WEP.
The speed of WEP cracking depends upon several factors, including the complexity of the WEP key, the number of WEP-encrypted packets that have been collected, and the speed of the machine performing the decryption on the collected packets. A weak key with lots of packets and a very fast machine with lot of free memory is your best-case scenario.
WEP cracking is really old news and, unless you are writing a paper on wireless security for a class project, there is nothing to be gained by performing a practical demonstration of how easy it is to crack WEP. How do you intend to attempt to crack WPA and WPA2 to prove that they are stronger than WEP? Simply cracking WEP alone doesn't prove that other wireless privacy solutions are stronger.
Forum Admin at www.techexams.net
--
LinkedIn: www.linkedin.com/in/jamesdmurray
Twitter: www.twitter.com/jdmurray
Forum Admin at www.techexams.net
--
LinkedIn: www.linkedin.com/in/jamesdmurray
Twitter: www.twitter.com/jdmurray
Start off with a demo of of how passwords, email, IM chats, etc. on a open wireless network are easily visible to a wireless sniffer.
For a WEP cracking demo, use a short, simple WEP key that any brute force cracker can easily find, such as "12345678".
For a MAC address filter vulnerability demo, show how enabling a MAC filter will prevent a wireless client from associating with an access point, but allow another wireless client to associate and authenticate. Then, using a wireless sniffer, capture packets from the other client's traffic and show how easily it is to clone MAC address into WNIC firmware, thus getting around the MAC filter. You'll need a WNIC with firmware that allows you to change its MAC address, of course.
Forum Admin at www.techexams.net
--
LinkedIn: www.linkedin.com/in/jamesdmurray
Twitter: www.twitter.com/jdmurray
http://www.lctjournal.washington.edu/Vol1/a009Ramasastry.html
It has some great information on a piece titled "Will Wi-Fi Make Your Private Network Public? Wardriving, Criminal and Civil Liability, and the Security Risks of Wireless Networks"
If the moderator would prefer to post this as a new topic instead of an add-on to this thread please feel free.
Forum Admin at www.techexams.net
--
LinkedIn: www.linkedin.com/in/jamesdmurray
Twitter: www.twitter.com/jdmurray