Showing posts with label WIFI. Show all posts
Showing posts with label WIFI. Show all posts

Thursday, 10 November 2011

how to crack WEP key using Korek's ChopChop Attack over wireless


This attack, when successful, can decrypt a WEP data packet without knowing the key. It can even work against dynamic WEP. This attack does not recover the WEP key itself, but merely reveals the plaintext. However, some access points are not vulnerable to this attack. Some may seem vulnerable at first but actually drop data packets shorter that 60 bytes. If the access point drops packets shorter than 42 bytes, aireplay tries to guess the rest of the missing data, as far as the headers are predictable. If an IP packet is captured, it additionally checks if the checksum of the header is correct after guessing the missing parts of it. This attack requires at least one WEP data packet.
If you wish to learn more about the theory behind this attack, see ChopchopTheory.

                                                       - - - - - Video Demo - - - - - 

More more detail about Korek's ChopChop Attack click here.

For download aircrack wifi hacking tools than go to www.aircrack-ng.org it's free.
and u learn about how to use aircrack tool than click here

Wednesday, 9 November 2011

How to crack WPA key with VIDEO DEMONSTRATION


Wi-Fi Protected Access (WPA) was created to solve the gaping security flaws that plagued WEP. Perhaps the most predominant flaw in WEP is that the key is not hashed, but concatenated to the IV, allowing completely passive compromise of the network. With WEP, you can literally sit in your car listening for packets on a network. Once you have captured enough of them, you can extract the key and connect to the network.
WPA solves this problem by rotating the key on a per-packet basis, which renders the above method useless. However, nothing is perfectly secure, and WPA-PSK is particularly vulnerable during client association, during which the hashed network key is exchanged and validated in a "four-way handshake".
The Wi-Fi Alliance, creators of WPA, were aware of this vulnerability and took precautions accordingly. Instead of concatenating the key in the IV (the weakness of WEP), WPA hashes they key using the wireless access point's SSID as a salt. The benefits of this are two-fold.
First, this prevents the statistical key grabbing techniques that broke WEP by transmitting the key as a hash (cyphertext). It also makes hash precomputation via a technique similar to Rainbow Tables more difficult because the SSID is used as a salt for the hash. WPA-PSK even imposes a eight character minimum on PSK passphrases, making bruteforce attacks less feasible.
So, like virtually all security modalities, the weakness comes down to the passphrase. WPA-PSK is particularly susceptible to dictionary attacks against weak passphrases. In this How To, we'll show you how to crack weak WPA-PSK implementations and give you some tips for setting up a secure WPA-PSK AP for your SOHO.

                                                        - - - - - Video - - - - -



                                                     - - - - - Video - - - - -



Related post : 


Tuesday, 8 November 2011

How to Ssl Mitm Attack Over Wireless Network with Video Demonstration


SSL Man in the Middle Attack has grown to become one of the most common way of exploiting victims. This attack requires that the Hacker places himself in the middle of all communication happening between victim and another destination host. In order to do this on the wired side, ARP cache poisoning and traffic rerouting have been the most prevalent techniques used. On the wireless side hijacking Layer 2 and above is whole different game. Among the various techniques which can be used, the most common one seen in the wild is using a Honeypot. A wireless Honeypot is a Hacker controlled Access Point (generally a soft AP) which lures victims to connect to it. Once the victim connects to the Honeypot, the hacker has full control of the Internet traffic sent and received by the victim. In this video we will look at how a Hacker can setup a wireless Honeypot and do a SSL Man in the Middle Attack.

Download Ebook Tutorial  

                                                     - - - - - Video Tutorial - - - - - 
                                                       - - - - - DEMO - - - - -


Wednesday, 2 November 2011

Fern wifi cracker for wireless penetration testing



This is a wireless security auditing application that is written in python and uses python-qt4. This application uses the aircrack-ng suite of tools.


It should work on any version of linux running the following:


Requirements:


  • python
  • python-qt4
  • macchanger
  • aircrack-ng
  • xterm
  • subversion

For Slax Distributions, download the zipped module package on the download section, and follow the instructions in the "README" file.


To install simply run the following command in terminal after changing directory to the path were the downloaded package is:


root@host:~# dpkg -i Fern-Wifi-Cracker_1.2_all.deb


Icons and Running the application:


Software Icon can be found at the application Menu of the GNOME desktop interfaces


Icon can also be found at /usr/share/applications for KDE and also GNOME:


There you find "Fern_Wifi_Cracker.desktop"


To get the source code for this project from SVN, here's the checkout link:


root@host:~# svn checkout http://fern-wifi-cracker.googlecode.com/svn/Fern-Wifi-Cracker/


Download Fern wifi cracker