| ||||||||||||
| ||||||||||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Arguments to gencases allow the user to specify the WEP key that will be used
to encrypt the packets as well as the number of packets to be generated for each
byte of the wep key. The generated packets represent UDP echo requests from host
192.168.0.2 (on a wired net) to host 192.168.0.10 (on a wireless net) and the
corresponding replies. The wireless client has MAC 00:02:2d:01:23:45, the wired
host has MAC 00:04:5A:AB:CD:EF, and the access point has BSSID 00:02:2D:98:76:54.
The generated packet file can be examined with standard packet analysis tools such
as tcpdump or ethereal. It can also be loaded into
airsnort(1)
which, given that a sufficient number of cases were generated for each key byte,
will produce a cracked WEP key. Running the generated file through the
decrypt(1)
utility will produce the decrypted versions of the packets which should reflect
the echo request/reply traffic described above, and which can be verified using
tcpdump or ethereal.
Generate 200 cases per key byte with the hex key "23:56:89:ab:de" to file "test"
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast