Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
172Activity
0 of .
Results for:
No results containing your search query
P. 1
Aircrack-Ng for Windows

Aircrack-Ng for Windows

Ratings:

5.0

(1)
|Views: 48,098 |Likes:
Published by api-3861287

More info:

Published by: api-3861287 on Oct 19, 2008
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less

05/09/2014

pdf

text

original

 
Aircrack-ng for Windows - Aircrack:
 Project Homepage:http://www.aircrack-ng.org/index.php?title=Main_Page Aircrack-ng is the next generation of Christophe Devine's excellent aircrack suite of tools.INSTALLING AIRCRACK-NG FOR WINDOWS RUNNING AIRCRACK-NG FOR WINDOWS BREAKING WEP BREAKING WPA 
Running Aircrack-ng for Windows:
 Once as many IVs as required have been captured using theairodumppacket capture utilitythe resultant
[filename].cap
file can be imported into aircrack to break the static WEP orWPA-PSK keys. To view all available switches:
cd c:\aircrack-ng-[version]
 
aircrack-ng.exe
 
 
 Basic usage:
aircrack -q -n [WEP key length] -b [BSSID] [filename].cap
C:\aircrack\bin\ 
aircrack -q -n -b capture2.cap
Breaking WEP:
 As you can see the capture file in use below (
capture1.ivs
) was created with airodumpcapture option "
Only capture WEP IVs (y/n)
" set to
"y"
as the resultant file is in the
.ivs
format. If 
n
had been selected the resultant file would be in the
.cap
format.
 
 Whilst this will work, we can could have cut down the cracking options for Aircrack-ng byspecifying the WEP key length (
-n
) or by specifying the target AP MAC address (
-b
) on thecommand line: 
aircrack -a 1 -q -n 128 -b 11:11:11:11:11:11 capture1.ivs
(Where11:11:11:11:11:11 = Target AP's MAC address) As you can see aircrack found the WEP key for our 1008195 IV capture file (capture1.ivs) in
only 4 seconds
. The capture file itself (
capture1.ivs
) is includedhereto test your own aircrack installs (note:the file is a 5.77mb download). 
Breaking WPA:
 In order to be carry out the WPA dictionary attack using aircrack-ng we either have to: 1.Wait for a WPA client to associate to the network (This could take a while)2.Force a WPA client off the network, forcing it to reassociate. Either of these two method allows us to capture the WPA handshake, which is what we requireto perform a dictionary attack. The downside to using this Windows version of aircrack-ng is that there are not any freelyavailable tools to perform this attack. So we have to either use a Linux tools (e.g.aireplayorvoid11) or wait for an association to occur.Which ever way we gather the WPA handshake we still use the same tool;airodump.

Activity (172)

You've already reviewed this. Edit your review.
1 hundred thousand reads
1 thousand reads
1 hundred reads
tataraseanu liked this
andysaon23 liked this
Azothmagnum liked this
dudd123 liked this
vitelioat liked this
Ebby Sigasare liked this
Samad Khan liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->