WEP Attack (OPEN) - Clients connected
1. Fake authentication attack (MAC association)
In a possible attack scenario, where an AP has MAC address filtering. We need to first obtain a valid mac address of a client, then wait until the client is no longer on the network and impersonate the client by performing fake authentication attack to associate our attacking machine with the victim access point.
More Importantly: This step may be required against targets that have mac whitelisting which the AP will only accept connections from specifically whitelisted MAC addresses. If this happens, we will need to observe in monitor mode for a client that is associated to the AP (lower part screen of the airodump-ng output) and wait for them to disconnect before impersonating their MAC address.
As usual begin all attacks with putting your adapter in monitor mode, mines on wlan0
You will see that your monitor MAC address is added (lower screen of your airmon-ng screen) showing that it is now associated with the target AP.
Info: iWireshark will show that there are 4 packets in this sequence of exchange. Protocol 802.11.
we send a "Open System" request (Authentication Algorithm) to AP
AP response with status code successful
we send a association request "SSID parameter set: AP_ESSID_NAME"
AP response with status code successful
2. Collect IV data using ARP replay attack
Using the interactive aireplay attack we choose a specific packet to replay against target network to get a response (eg. using ARP will make client respond the ARP response) to generate enough IV so that we can successfully crack the WEP password
Info: When a packet is captured, we can chose to use that packet to replay against the target to collect more IV (more IV collected will help crack the WEP password). You will see the 'data' field in your monitor count increasing rapidly, if not use other packets. About 40,000 data count collected should be enough to crack the WEP.
3. Cracking WEP
Now that we have enough IV collected (in the written cap file) we can easily crack it using
Last updated