SlideShare a Scribd company logo
1 of 9
Download to read offline
By Rohit Shaw Page 1
Wi-Fi : "WiFi" is the short form for Wireless Fidelity. It is a high speed internet
and network connection without the use of wires, cables. It means a type of
wireless networking protocol that allows devices to communicate and transfer data
wirelessly without cords or cables.[1] Wi-Fi is technically an industry term that
represents a type of wireless local area network (LAN) protocol based on the
802.11 IEEE network standard. It's the most popular means of communicating data
wirelessly, within a fixed location, today.[2]
A device that can use Wi-Fi (such as a personal computer, video game
console, smartphone, tablet, or digital audio player) can connect to a network
resource such as the Internet via a wireless network access point. Such an access
point has a range of about 20 meters (65 feet) indoors and a greater range
outdoors.[3]
Wi-Fi KEYS : A wireless key is an encryption setting commonly used on
wireless computer networks to increase their security. The two standard types of
wireless keys support WEP and WPA encryption. To use a wireless key on a home
network, administrators first set up an encryption method on the router (either
WEP or WPA) and choose a value for the appropriate key. Then, the administrator
Wi-Fi
Wi-Fi Keys
• WEP
• WPA TUTORIAL CONCLUSION
By Rohit Shaw Page 2
sets the same value on each wireless device connecting to the router. Wireless keys
are hexadecimal numbers that vary in length (but are typically between 128 and
256 bits long) depending on the encryption method used.[4]
 WEP : WEP stands for Wired Equivalent Privacy, A WEP key is a security
code used on some Wi-Fi networks. WEP keys allow a group of devices on a
local network (such as a home network) to exchange encoded messages with
each other while hiding the contents of the messages from easy viewing by
outsiders. A WEP key is a sequence of hexadecimal digits. These digits
include the numbers 0-9 and the letters A-F.
The length of a WEP key depends on the type of WEP security
utilized: i) 40-/64bit WEP: 10 digit key
ii) 104-/128bit WEP: 26 digit key
iii) 256bit WEP: 26 digit key[5]
 WPA : WPA was developed by the networking industry in response to the
weaknesses of WEP. WPA provides stronger encryption than WEP through use
of either of two standard technologies: Temporal Key Integrity Protocol
(TKIP) and Advanced Encryption Standard (AES). A variation of WPA
designed for use on home networks is called WPA Pre Shared Key or WPA-
PSK for short. WPA-PSK is a simplified but still powerful form of WPA.[6]
TUTORIAL : In this tutorial here I am going to show you how to crack WEP keys
in Windows platform.
Tools required : 1] CommView for WiFi
2] Aircrack-ng
Now open your CommView for Wifi and go to file option and click on file capture like
shown in figure.1
By Rohit Shaw Page 3
Figure.1
After that a new window appears and then click on start scanning.
Figure.2
By Rohit Shaw Page 4
After scanning its shows the list of all channels and the wireless networks which is
running on specified channels like shown in figure.3
Figure.3
In above figure.2 I selected a network which is running on channel 6.For details see
in right side of window it shows the network encryption type, SSID, MAC address.
Then click on capture and wait for the packet data you have to create minimum
5000 packets for cracking a WEP key. Numbers of packets are high then it is easy
for you to crack the key. Like shown in figure.4
By Rohit Shaw Page 5
Figure.4
When sufficient packets will create the go to file options and click on stop capture.
Figure.5
After the capturing process it creates a log file in log folder you can check your log
folder directory by clicking on log tab. In figure. 6 here it shows the directory of my
log folder which is in my documents/CommView for Wifi/Logs.
By Rohit Shaw Page 6
Figure.6
Now go to log folder there you can see a capture file like shown in figure.7
Figure.7
Now just double click on that file and a new window appeared then go to file option
select Export logs then select Wireshark/Tcpdump format and save your file. Here I
save my file name as hack.cap in my desktop shown in figure.8
By Rohit Shaw Page 7
Figure.8
Now open your Aircrack GUI and browse for your saved capture file. Shown in
figure.9
Figure.9
After that click on Launch button then a cmd window appears and asking for index
no. of target network here my target network index no. is 1 like shown in figure.10
By Rohit Shaw Page 8
Figure.9
After putting your index number then press enter and the cracking process starts
and the key decrypted successfully like shown in figure.11
Figure.10
By Rohit Shaw Page 9
CONCLUSIONS : Hence we conclude that WEP key is not secured. If we create a
256 bit key that can also cracked but that is time consuming we have to capture a
higher number of packets and data.
REFERENCES :
1] URL - http://www.squidoo.com/what-is-wifi
2] URL - http://mobileoffice.about.com/od/glossary/g/wi-fi.htm
3] URL - http://en.wikipedia.org/wiki/Wi-Fi
4] URL -http://compnetworking.about.com/od/wirelesssecurity/f/what-is-a-
wireless-key.htm
5] URL - http://compnetworking.about.com/od/wirelessfaqs/f/wep_keys.htm
6] URL - http://compnetworking.about.com/cs/wirelesssecurity/g/bldef_wpa.htm

More Related Content

What's hot

WIFI; making a wireless connection
WIFI; making a wireless connectionWIFI; making a wireless connection
WIFI; making a wireless connectionWebster University
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Securityamiable_indian
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Securitykentquirk
 
Pentesting Wireless Networks and Wireless Network Security
Pentesting Wireless Networks and Wireless Network SecurityPentesting Wireless Networks and Wireless Network Security
Pentesting Wireless Networks and Wireless Network SecurityAyoma Wijethunga
 
Module 4 Enumeration
Module 4   EnumerationModule 4   Enumeration
Module 4 Enumerationleminhvuong
 
Hacking Wireless Networks by Mandeep Singh Jadon
Hacking Wireless Networks by Mandeep Singh JadonHacking Wireless Networks by Mandeep Singh Jadon
Hacking Wireless Networks by Mandeep Singh JadonOWASP Delhi
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminarNilesh Sapariya
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network SecurityGyana Ranjana
 
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Mohammad Fareed
 
Hacking wireless networks
Hacking wireless networksHacking wireless networks
Hacking wireless networksSahil Rai
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsAirTight Networks
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Fábio Afonso
 
Network Security Applications
Network Security ApplicationsNetwork Security Applications
Network Security ApplicationsHatem Mahmoud
 
Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)Mandeep Jadon
 

What's hot (20)

WIFI; making a wireless connection
WIFI; making a wireless connectionWIFI; making a wireless connection
WIFI; making a wireless connection
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
 
Cracking WPA/WPA2 with Non-Dictionary Attacks
Cracking WPA/WPA2 with Non-Dictionary AttacksCracking WPA/WPA2 with Non-Dictionary Attacks
Cracking WPA/WPA2 with Non-Dictionary Attacks
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
IPV6
IPV6IPV6
IPV6
 
Wi-fi Hacking
Wi-fi HackingWi-fi Hacking
Wi-fi Hacking
 
Pentesting Wireless Networks and Wireless Network Security
Pentesting Wireless Networks and Wireless Network SecurityPentesting Wireless Networks and Wireless Network Security
Pentesting Wireless Networks and Wireless Network Security
 
Module 4 Enumeration
Module 4   EnumerationModule 4   Enumeration
Module 4 Enumeration
 
Hacking Wireless Networks by Mandeep Singh Jadon
Hacking Wireless Networks by Mandeep Singh JadonHacking Wireless Networks by Mandeep Singh Jadon
Hacking Wireless Networks by Mandeep Singh Jadon
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
Securing wireless network
Securing wireless networkSecuring wireless network
Securing wireless network
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018
 
Hacking wireless networks
Hacking wireless networksHacking wireless networks
Hacking wireless networks
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2
 
WEP
WEPWEP
WEP
 
Network Security Applications
Network Security ApplicationsNetwork Security Applications
Network Security Applications
 
Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)
 

Viewers also liked

GHOST PARTNER: Grow your Business with Email and Social Media Marketing
GHOST PARTNER: Grow your Business with Email and Social Media MarketingGHOST PARTNER: Grow your Business with Email and Social Media Marketing
GHOST PARTNER: Grow your Business with Email and Social Media MarketingGhost Partner
 
U-Profit "Local SEO" Howard Flint SEP13
U-Profit "Local SEO" Howard Flint SEP13U-Profit "Local SEO" Howard Flint SEP13
U-Profit "Local SEO" Howard Flint SEP13Ghost Partner
 
Www.postadsearnmoney.com
Www.postadsearnmoney.comWww.postadsearnmoney.com
Www.postadsearnmoney.comallabakash
 
GHOST PARTNER - "Social Media Marketing Made Simple" JAN14
GHOST PARTNER - "Social Media Marketing Made Simple" JAN14GHOST PARTNER - "Social Media Marketing Made Simple" JAN14
GHOST PARTNER - "Social Media Marketing Made Simple" JAN14Ghost Partner
 
Ghost Partner: Getting found on Google (the basics)
Ghost Partner: Getting found on Google (the basics)Ghost Partner: Getting found on Google (the basics)
Ghost Partner: Getting found on Google (the basics)Ghost Partner
 
Wantly: Startup Weekend Pitch
Wantly: Startup Weekend PitchWantly: Startup Weekend Pitch
Wantly: Startup Weekend PitchJoshua Johnson
 
Shiloh Park: Preview Guide (September 8, 2016)
Shiloh Park: Preview Guide (September 8, 2016)Shiloh Park: Preview Guide (September 8, 2016)
Shiloh Park: Preview Guide (September 8, 2016)Joshua Johnson
 
"Go Mobile or Get Left Behind" by Howard Flint of Ghost Partner
"Go Mobile or Get Left Behind" by Howard Flint of Ghost Partner"Go Mobile or Get Left Behind" by Howard Flint of Ghost Partner
"Go Mobile or Get Left Behind" by Howard Flint of Ghost PartnerGhost Partner
 
Www.postadsearnmoney.com earn
Www.postadsearnmoney.com earnWww.postadsearnmoney.com earn
Www.postadsearnmoney.com earnallabakash
 
Getting found on Google by Howard Flint of Ghost Partner, Inc.
Getting found on Google by Howard Flint of Ghost Partner, Inc.Getting found on Google by Howard Flint of Ghost Partner, Inc.
Getting found on Google by Howard Flint of Ghost Partner, Inc.Ghost Partner
 
Kids Skate Free: Constant Contact pres by Howard Flint of Ghost Partner
Kids Skate Free: Constant Contact pres by Howard Flint of Ghost PartnerKids Skate Free: Constant Contact pres by Howard Flint of Ghost Partner
Kids Skate Free: Constant Contact pres by Howard Flint of Ghost PartnerGhost Partner
 

Viewers also liked (13)

GHOST PARTNER: Grow your Business with Email and Social Media Marketing
GHOST PARTNER: Grow your Business with Email and Social Media MarketingGHOST PARTNER: Grow your Business with Email and Social Media Marketing
GHOST PARTNER: Grow your Business with Email and Social Media Marketing
 
U-Profit "Local SEO" Howard Flint SEP13
U-Profit "Local SEO" Howard Flint SEP13U-Profit "Local SEO" Howard Flint SEP13
U-Profit "Local SEO" Howard Flint SEP13
 
Cuda cracking
Cuda crackingCuda cracking
Cuda cracking
 
Ring crafting
Ring craftingRing crafting
Ring crafting
 
Www.postadsearnmoney.com
Www.postadsearnmoney.comWww.postadsearnmoney.com
Www.postadsearnmoney.com
 
GHOST PARTNER - "Social Media Marketing Made Simple" JAN14
GHOST PARTNER - "Social Media Marketing Made Simple" JAN14GHOST PARTNER - "Social Media Marketing Made Simple" JAN14
GHOST PARTNER - "Social Media Marketing Made Simple" JAN14
 
Ghost Partner: Getting found on Google (the basics)
Ghost Partner: Getting found on Google (the basics)Ghost Partner: Getting found on Google (the basics)
Ghost Partner: Getting found on Google (the basics)
 
Wantly: Startup Weekend Pitch
Wantly: Startup Weekend PitchWantly: Startup Weekend Pitch
Wantly: Startup Weekend Pitch
 
Shiloh Park: Preview Guide (September 8, 2016)
Shiloh Park: Preview Guide (September 8, 2016)Shiloh Park: Preview Guide (September 8, 2016)
Shiloh Park: Preview Guide (September 8, 2016)
 
"Go Mobile or Get Left Behind" by Howard Flint of Ghost Partner
"Go Mobile or Get Left Behind" by Howard Flint of Ghost Partner"Go Mobile or Get Left Behind" by Howard Flint of Ghost Partner
"Go Mobile or Get Left Behind" by Howard Flint of Ghost Partner
 
Www.postadsearnmoney.com earn
Www.postadsearnmoney.com earnWww.postadsearnmoney.com earn
Www.postadsearnmoney.com earn
 
Getting found on Google by Howard Flint of Ghost Partner, Inc.
Getting found on Google by Howard Flint of Ghost Partner, Inc.Getting found on Google by Howard Flint of Ghost Partner, Inc.
Getting found on Google by Howard Flint of Ghost Partner, Inc.
 
Kids Skate Free: Constant Contact pres by Howard Flint of Ghost Partner
Kids Skate Free: Constant Contact pres by Howard Flint of Ghost PartnerKids Skate Free: Constant Contact pres by Howard Flint of Ghost Partner
Kids Skate Free: Constant Contact pres by Howard Flint of Ghost Partner
 

Similar to Wi fi

How to Hack WiFi on Windows
How to Hack WiFi  on Windows How to Hack WiFi  on Windows
How to Hack WiFi on Windows Vrushank Narola
 
Wireless routers Presentation
Wireless routers PresentationWireless routers Presentation
Wireless routers PresentationFahd Allebdi
 
Viable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedIRJET Journal
 
Pentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssueIshan Girdhar
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Wireless hacking tools.jpeg
Wireless hacking tools.jpegWireless hacking tools.jpeg
Wireless hacking tools.jpegTushant sharma
 
adhoc network workshop
adhoc network workshopadhoc network workshop
adhoc network workshopAli Nezhad
 
DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting Shah Sheikh
 
Deauthentication Attack with Node MCU & Esp8266
Deauthentication Attack with Node MCU & Esp8266Deauthentication Attack with Node MCU & Esp8266
Deauthentication Attack with Node MCU & Esp8266Akash Thakur
 
Auditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN ImplementationAuditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN ImplementationCARMEN ALCIVAR
 
Configure router for wap (wireless access point
Configure router for wap (wireless access pointConfigure router for wap (wireless access point
Configure router for wap (wireless access pointsergio goco
 
Fundamentals of network hacking
Fundamentals of network hackingFundamentals of network hacking
Fundamentals of network hackingPranshu Pareek
 
Tcpip networking basics_and_troubleshooting
Tcpip networking basics_and_troubleshootingTcpip networking basics_and_troubleshooting
Tcpip networking basics_and_troubleshootingKumar
 
Google global Cache operations for youtube
Google global Cache operations for youtubeGoogle global Cache operations for youtube
Google global Cache operations for youtubeShahinAlam930521
 

Similar to Wi fi (20)

How to Hack WiFi on Windows
How to Hack WiFi  on Windows How to Hack WiFi  on Windows
How to Hack WiFi on Windows
 
Wireless routers Presentation
Wireless routers PresentationWireless routers Presentation
Wireless routers Presentation
 
Viable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be Jeopardized
 
Pentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 Issue
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Wireless hacking tools.jpeg
Wireless hacking tools.jpegWireless hacking tools.jpeg
Wireless hacking tools.jpeg
 
adhoc network workshop
adhoc network workshopadhoc network workshop
adhoc network workshop
 
DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting
 
D2 d wifi
D2 d wifiD2 d wifi
D2 d wifi
 
Deauthentication Attack with Node MCU & Esp8266
Deauthentication Attack with Node MCU & Esp8266Deauthentication Attack with Node MCU & Esp8266
Deauthentication Attack with Node MCU & Esp8266
 
Auditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN ImplementationAuditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN Implementation
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
woot15-paper-novella
woot15-paper-novellawoot15-paper-novella
woot15-paper-novella
 
Configure router for wap (wireless access point
Configure router for wap (wireless access pointConfigure router for wap (wireless access point
Configure router for wap (wireless access point
 
Fundamentals of network hacking
Fundamentals of network hackingFundamentals of network hacking
Fundamentals of network hacking
 
null Pune meet - Wireless Security
null Pune meet - Wireless Securitynull Pune meet - Wireless Security
null Pune meet - Wireless Security
 
Technical Report
Technical ReportTechnical Report
Technical Report
 
Tcpip networking basics_and_troubleshooting
Tcpip networking basics_and_troubleshootingTcpip networking basics_and_troubleshooting
Tcpip networking basics_and_troubleshooting
 
Google global Cache operations for youtube
Google global Cache operations for youtubeGoogle global Cache operations for youtube
Google global Cache operations for youtube
 
WiFi security
WiFi security WiFi security
WiFi security
 

Wi fi

  • 1. By Rohit Shaw Page 1 Wi-Fi : "WiFi" is the short form for Wireless Fidelity. It is a high speed internet and network connection without the use of wires, cables. It means a type of wireless networking protocol that allows devices to communicate and transfer data wirelessly without cords or cables.[1] Wi-Fi is technically an industry term that represents a type of wireless local area network (LAN) protocol based on the 802.11 IEEE network standard. It's the most popular means of communicating data wirelessly, within a fixed location, today.[2] A device that can use Wi-Fi (such as a personal computer, video game console, smartphone, tablet, or digital audio player) can connect to a network resource such as the Internet via a wireless network access point. Such an access point has a range of about 20 meters (65 feet) indoors and a greater range outdoors.[3] Wi-Fi KEYS : A wireless key is an encryption setting commonly used on wireless computer networks to increase their security. The two standard types of wireless keys support WEP and WPA encryption. To use a wireless key on a home network, administrators first set up an encryption method on the router (either WEP or WPA) and choose a value for the appropriate key. Then, the administrator Wi-Fi Wi-Fi Keys • WEP • WPA TUTORIAL CONCLUSION
  • 2. By Rohit Shaw Page 2 sets the same value on each wireless device connecting to the router. Wireless keys are hexadecimal numbers that vary in length (but are typically between 128 and 256 bits long) depending on the encryption method used.[4]  WEP : WEP stands for Wired Equivalent Privacy, A WEP key is a security code used on some Wi-Fi networks. WEP keys allow a group of devices on a local network (such as a home network) to exchange encoded messages with each other while hiding the contents of the messages from easy viewing by outsiders. A WEP key is a sequence of hexadecimal digits. These digits include the numbers 0-9 and the letters A-F. The length of a WEP key depends on the type of WEP security utilized: i) 40-/64bit WEP: 10 digit key ii) 104-/128bit WEP: 26 digit key iii) 256bit WEP: 26 digit key[5]  WPA : WPA was developed by the networking industry in response to the weaknesses of WEP. WPA provides stronger encryption than WEP through use of either of two standard technologies: Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES). A variation of WPA designed for use on home networks is called WPA Pre Shared Key or WPA- PSK for short. WPA-PSK is a simplified but still powerful form of WPA.[6] TUTORIAL : In this tutorial here I am going to show you how to crack WEP keys in Windows platform. Tools required : 1] CommView for WiFi 2] Aircrack-ng Now open your CommView for Wifi and go to file option and click on file capture like shown in figure.1
  • 3. By Rohit Shaw Page 3 Figure.1 After that a new window appears and then click on start scanning. Figure.2
  • 4. By Rohit Shaw Page 4 After scanning its shows the list of all channels and the wireless networks which is running on specified channels like shown in figure.3 Figure.3 In above figure.2 I selected a network which is running on channel 6.For details see in right side of window it shows the network encryption type, SSID, MAC address. Then click on capture and wait for the packet data you have to create minimum 5000 packets for cracking a WEP key. Numbers of packets are high then it is easy for you to crack the key. Like shown in figure.4
  • 5. By Rohit Shaw Page 5 Figure.4 When sufficient packets will create the go to file options and click on stop capture. Figure.5 After the capturing process it creates a log file in log folder you can check your log folder directory by clicking on log tab. In figure. 6 here it shows the directory of my log folder which is in my documents/CommView for Wifi/Logs.
  • 6. By Rohit Shaw Page 6 Figure.6 Now go to log folder there you can see a capture file like shown in figure.7 Figure.7 Now just double click on that file and a new window appeared then go to file option select Export logs then select Wireshark/Tcpdump format and save your file. Here I save my file name as hack.cap in my desktop shown in figure.8
  • 7. By Rohit Shaw Page 7 Figure.8 Now open your Aircrack GUI and browse for your saved capture file. Shown in figure.9 Figure.9 After that click on Launch button then a cmd window appears and asking for index no. of target network here my target network index no. is 1 like shown in figure.10
  • 8. By Rohit Shaw Page 8 Figure.9 After putting your index number then press enter and the cracking process starts and the key decrypted successfully like shown in figure.11 Figure.10
  • 9. By Rohit Shaw Page 9 CONCLUSIONS : Hence we conclude that WEP key is not secured. If we create a 256 bit key that can also cracked but that is time consuming we have to capture a higher number of packets and data. REFERENCES : 1] URL - http://www.squidoo.com/what-is-wifi 2] URL - http://mobileoffice.about.com/od/glossary/g/wi-fi.htm 3] URL - http://en.wikipedia.org/wiki/Wi-Fi 4] URL -http://compnetworking.about.com/od/wirelesssecurity/f/what-is-a- wireless-key.htm 5] URL - http://compnetworking.about.com/od/wirelessfaqs/f/wep_keys.htm 6] URL - http://compnetworking.about.com/cs/wirelesssecurity/g/bldef_wpa.htm