Showing posts with label WEP cracking. Show all posts
Showing posts with label WEP cracking. Show all posts

WEP CRACKING IN WINDOWS [FULL GUI,WITH PICS][TUT]


INTRODUCTION :
Many Windows users here are struggling to hack WiFi networks because most of the tutorials are based on BackTrack and other Linux Tools .

Im just sharing the method to Crack WiFi networks using WEP security protocol . The WEP is a very vuarable to attacks and can be cracked
easily .
It takes about 5-6 hours if the password is weak a high signal of the WiFi network you are going to hack and you have sometimes 10-12 for more complicated passwords and if the WiFi signal of the Network is weak .
The time taken also changes if the WiFi network you are going to hack has many other clients already accessing it .


You will be using two tools .
1.Commview for WiFi :
You will use this tool for capturing the packets sent and recieved through the Access Point you are going to hack .
The more packets you capture the better chances of cracking the password .
You will need more than 1,00,000 minium packets to crack the password .
The packets will be captured in the .ncp format .
You will use this tool to convert the .ncp to .cap .

NOTE : Some WiFi cards are supported by Commview only in Windows 7 so i suggest you install Win 7 in ur Virtual Machine if ur card isnt supported .


2.Aircrack-Ng GUI :
You will use this tool to crack the password of the Access Point using the .cap files you obtained from the Commview application .

NOTE : You need to run this as administrator .

I have provided links for both the software below .




Download Links :

These are the links to the official website of the tools .
Some Anti Viruses might detect Aircrack as a virus . It is a false positive .

1.Aircrack-NG GUI

Get it from here : http://www.aircrack-ng.org/


2.Commview for Wifi

Get it from here : http://www.tamos.com/download/main/ca.php



GET READY TO CRACK :


STEP 1 :
1.Install CommView for WiFi . It doesnt matter whether you install it in VoIP mode or Standard mode . I used VoIP .
It automatically installs the necessary drivers . Allow it to install .

NOTE : You will not be able to connect to any Network using WiFi when using CommView .

STEP 2 :
2.Click on the PLAY ICON in the Left First .



STEP 3 (Choosing the Network (a) ) :
A new window should pop up now .
Click on the START SCANNING button .

STEP 4 (Choosing the Network (b) ) :
Click on the WiFi network you want to hack in the Right Coulumn and Click on CAPTURE.
NOTE : This tutorial is only for WEP protected networks .


STEP 5 (Capturing the Packets) :
The windows should close now and you should see that CommView has started Capturing Packets .


STEP 6 (Saving the Packets ) :
Now that the Packets are getting captured you need to Save them.
Click on Settings->Options->Memory Usage
Change Maximum Packets in buffer to 20000

Click on the LOGGING Tab .
Check AUTO-SAVING
In the Maximum Directory Size : 2000
Average Log File Size : 20

Now CommView will automatically Start Saving packets in the .ncp format at a size of 20MB each in the specified directory .

STEP 7 ( Concatenating the Logs ) :
Since you are capturing a lot of logs you will need to concatenate them into once file .
To do this go to Logging and click on CONCATENATE LOGS
Choose all the files that have been saved in your specified folder and Concatenate them .

Now you will have one .ncf file .

STEP 8 (Converting .ncf to .cap ) :
Now that you have one file with all the packets you need to Convert it into .cap file for AIRCRACK to crack .
Click on File->Log Viewer->Load Commview Logs-> Choose the .ncf file
Now File->Export->Wireshark/TCP dump format .


------------------------------------------------------------------



Aircrack Part :


Now for the Second Part Cracking this is very simple .

Just open the Aircrack Folder->Bin->Aircrack-ng GUI.exe

Choose the .cap file and you should be able to do the others .


If you have any questions or having problems post a thread il reply .

This is a simple tutorial . There is more advance using the rules and stuff but I havnt used it yet . This worked for me . Hope you found it useful .

Took a lot of time . Please leave your feedback.

Happy Hacking ! Pirate
READMORE
 

WEP cracking with Fern WIFI Cracker - Almost To Easy[Tut]

Warning!
If you want to learn about using Aircrack-ng, Linux, network and so on do not use this tutorial. If you just want to crack a WEP network without learning anything this is the tutorial for you!

Fern Wifi Cracker is a GUI for Aircrack-ng, it makes cracking WEP it so damn simple. I’m on Backtrack 4 here and the only thing you will need download and installing Fern Wifi cracker is to open the terminal and use these two commands: (if you on another distro you might need to install some packets first )
Code:
wget http://fern-wifi-cracker.googlecode.com/files/Fern-Wifi-Cracker_1.2_all.deb
dpkg -i Fern-Wifi-Cracker_1.2_all.deb

To start the program go to:
Code:
/usr/share/applicationsFern_Wifi_Cracker.desktop

The first time you open Fern Wifi cracker, you’ll need to update it from 1.2 to version 1.5. You will see the text New update is Available

1. Click the Update button

[Image: snapshot1_tilpasset.png]

Wait for the update to be installed. You will see the text Please Restart application

2. Shutdown the application and start it back up again

[Image: snapshot2_tilpasse.png]

You will now see the text Latest update is already installed

3. Click the dropdown list Select interface

4. Select the interface you want to use

[Image: snapshot3_tilpasse.png]

After a minute a popup will open.

5. Click the Ok bottom

[Image: snapshot4_tilpasse.png]

Optional!
The next part might be unnecessary, but it’s my personally experience that cracking a network with connected client is much easier then without. Since this is a beginner tutorial I will not go in to why.

6. Doubleclick in any area of the main window

7. A window call Access Point Scan Preferences opens

8. Click the Enable XTerms checkbox

9. Click the Ok bottom

[Image: snapshot5_tilpasse.png]

Let’s start sniffing for Accesspoint nearby.

10. Click the Scan bottom

[Image: snapshot6_tilpasse.png]

If you did the part with enabling XTerm - two popups will appear. Since this tutorial will only show WEP cracking you can close the one named FERN (WPA SCAN). Now let’s have a look at the window called FERN (WEP SCAN). We need a accesspoint with a client connected to it. At the top half of the screen we see all the accesspoints in the area, and a lot of information about them. At the bottom of the window we see that a client is connected to a Accesspoint with the BSSID 00:13:f7:61:24:DA. If we compare this list in the top of the screen we will see that the name of this Accesspoint is SMC.So now we know that the accesspoint SMC have a client connected.

11. Close the window FERN (WEP SCAN)

[Image: snapshot7_tilpasse.png]

12. Click the WEP button

The window Fern WEP Attack opens.

13. Click the dropdown list at the top of the window

14. Select the access point SMC that we found before

[Image: snapshot9_tilpasse.png]

15. Click the Attack bottom and wait for the magic to happen.

If you did the part with enabling Xterm, two additional windows will open, just leave them be.

[Image: snapshot10_tilpasse.png]

Sit back and wait for the key to the network to appear!

[Image: snapshot13.png]
READMORE