Wi-Fi Network Hacking Tricks and Tools
This tutorial will explain that how to crack wep key using Backtrack.
Wireless
networks are everywhere; they are widely available, cheap, and easy to
setup. To avoid the hassle of setting up a wired network in my own home,
I chose to go wireless. After a day of enjoying this wireless freedom, I
began thinking about security. How secure is my wireless network?
I searched
the Internet for many days, reading articles, gathering information,
and participating on message boards and forums. I soon came to the
realization that the best way for me to understand the security of my
wireless network would be to test it myself. Many sources said it was
easy, few said it was hard.
How a wireless network works
A
wireless local area network (WLAN) is the linking of 2 or more
computers with Network Interface Cards (NICs) through a technology based
on radio waves. All devices that can connect to a wireless network are
known as stations. Stations can be access points (APs), or clients.
Access
points are base stations for the wireless network. They receive and
transmit information for the clients to communicate with. The set of all
stations that communicate with each other is referred to as the Basic
Service Set (BSS). Every BSS has an Identification known as a BSSID,
also known as the MAC address, which is a unique identifier that is
associated with every NIC. For any client to join a WLAN, it should
know the SSID of the WLAN; therefore, the access points typically
broadcast their SSID to let the clients know that an AP is in range.
Data streams, known as packets, are sent between the Access Point, and
it’s clients. You need no physical access to the network or its wires to
pick up these packets, just the right tools. It is with the
transmission of these packets that pose the largest security threat to
any wireless network.
Wireless Encryption
The majority of home and small business networks are encrypted using the two most popular methods:
- WEP & WPA
WEP
– Wired Equivalent Privacy – comes in 3 different key lengths: 64, 128,
and 256 bits, known as WEP 64, WEP 128, and WEP 256 respectively. WEP
provides a casual level of security but is more compatible with older
devices; therefore, it is still used quite extensively. Each WEP key
contains a 24 bit Initialization Vector (IV), and a user-defined or
automatically generated key; for instance, WEP 128 is a combination of
the 24 bit IV and a user entered 26 digit hex key. ((26*4)+24=128)
WEP also comes in WEP2 and WEP+, which are not as common and still as vulnerable as the standard WEP encryption.
WPA
– WiFi Protected Access – comes in WPA and WPA2, and was created to
resolve several issues found in WEP. Both provide you with good
security; however, they are not compatible with older devices and
therefore not used as widely. WPA was designed to distribute different
keys to each client; however, it is still widely used in a (not as
secure) pre-shared key (PSK) mode, in which every client has the same
passphrase.
To fully
utilize WPA, a user would need an 802.1x authentication server, which
small businesses and typical home users simply cannot afford. WPA
utilizes a 48 bit Initialization Vector (IV), twice the size of WEP,
which combined with other WEP fixes, allows substantially greater
security over WEP.
Packets and IVs
It’s
all in the packets. The bottom line is – while you may be able to
employ several security features on your WLAN – anything you broadcast
over the air can be intercepted, and could be used to compromise the
security on your network. If that frightens you, start stringing wires
throughout your home.
Every
encrypted packet contains a 24 or 48 bit IV, depending on the type of
encryption used. Since the pre-shared key is static and could be
easily obtained, the purpose of the IV is to encrypt each packet with a
different key. For example, to avoid a duplicate encryption key in every
packet sent, the IV is constantly changing. The IV must be known to
the client that received the encrypted packet in order to decrypt it;
therefore, it is sent in plaintext.
The
problem with this method is that the Initialization Vectors are not
always the same. In theory, if every IV was different, it would be
nearly impossible to obtain the network key; this is not the case. WEP
comes with a 24 bit IV; therefore, giving the encryption 16 million
unique values that can be used. This may sound like a large number, but
when it comes to busy network traffic, it’s not.
Every
IV is not different; and this is where the issues arise. Network
hackers know that all the keys used to encrypt packets are related by a
known IV (since the user entered WEP part of the key is rarely changed);
therefore, the only change in the key is 24 bits. Since the IV is
randomly chosen, there is a 50% probability that the same IV will repeat
after just 5,000 packets; this is known as a collision.
If
a hacker knows the content of one packet, he can use the collision to
view the contents of the other packet. If enough packets are collected
with IV matches, your network’s security can be compromised.
The crack
Two
of the most popular programs used for actually cracking the WEP key are
Airsnort and Aircrack. Airsnort can be used with the .dump files that
Kismet provides; and Aircrack can be used with the .cap files that
Airodump provides.
Airsnort
can be used on it’s own without any other software capturing packets;
although, it has been reported to be extremely unstable in this state,
and you should probably not chance loosing all your captured data. A
better method would be to let Airsnort recover the encryption key from
your Kismet .dump file. Kismet and Airsnort can run simultaneously.
For
this demonstration, we’ll be using Aircrack. You can use Airodump to
capture the packets, and Aircrack to crack the encryption key at the
same time.
With Airodump running, open a new command window and type:
aircrack -f 3 -n 64 -q 3 george.cap
The -f switch
followed by a number is the fudgefactor; which is a variable that the
program uses to define how thoroughly it scans the .cap file. A
larger number will give you a better chance of finding the key, but will
usually take longer. The default is 2.
The -n switch
followed by 64 represents that you are trying to crack a WEP 64 key. I
knew because it was a setup; In the real world there is no way to
determine what WEP key length a target access point is using. You may
have to try both 64 and 128.
The -q 3 switch
was used to display the progress of the software. It can be left out
altogether to provide a faster crack; although, if you’ve obtained
enough unique IVs, you should not be waiting more than a couple minutes.
A -m switch
can be used, followed by a MAC address, to filter a
specific AP’s usable packets; this would come in handy if you were
collecting packets from multiple APs in Airodump.
Aircrack recovered my WEP 64 key within 1 minute using 76,000 unique IVs; the whole process took around 34 minutes.
The
same experiment was repeated with WEP 128 and it took about 43 minutes.
The reason it was not substantially longer is because I simply let
Airplay replay more packets. Sometimes you can get lucky and capture an
ARP Request packet within a few minutes; otherwise, it could take a
couple hours.
Next Post :- Wi-Fi Network Hacking Tools (Click Here )
aircrack -f 3 -n 64 -q 3 george.cap
0 comments:
Post a Comment
enjoy free 3G tricks