![]() Select “Associate with AP using fake auth” and you should see your capture session jump with connected clients. ![]() Then, select the “WEP Attacks (with clients)” section. Next click “Performs a test of injection AP” to verify that we are close enough to the access point. A new terminal session will open showing a summary of the capture interface. Under the “General functionalities” section, click “Start Sniffing and Logging” to start capturing packets. Now, select the “donthackme” Essid and go to the WEP tab. Then, click “Rescan networks” to display all nearby wireless networks. Go to the Configuration tab, click “Reload wireless interfaces”, select your interface, then click “Enable/Disable Monitor Mode”. You can find Gerix under Applications – Exploitation Tools – Wireless Exploitation Tools – WLAN Exploitation – gerix-wifi-cracker-ng. If you’re using a VM like me, you can attach the host system to the access point for your pinging client, and use your wireless USB NIC connected to your guest VM for the attack.Īs a summary from last time, here are the steps we are going to complete: With our hacking environment setup the same as before, we setup our access point, attach a client to it, and start a continuous ping to a non-existent address to generate a steady stream of ARP requests. Now that we know the basic steps for cracking WEP, from our last post, lets try a pointy-clicky GUI that’s included in the BackTrack distribution named Gerix Wifi Cracker.
0 Comments
Leave a Reply. |