{"id":716,"date":"2012-06-29T22:49:49","date_gmt":"2012-06-29T22:49:49","guid":{"rendered":"http:\/\/microsoftgeek.com\/?p=716"},"modified":"2018-09-06T23:29:24","modified_gmt":"2018-09-06T23:29:24","slug":"how-to-crack-a-wi-fi-networks-wep-password-with-backtrack","status":"publish","type":"post","link":"https:\/\/microsoftgeek.com\/?p=716","title":{"rendered":"How to Crack a Wi-Fi Network\u2019s WEP Password with BackTrack"},"content":{"rendered":"<p>I read LifeHacker pretty often, I came across this article that was interesting. I tried it and verified it worked so I wanted to post this on my site as well \ud83d\ude42<\/p>\n<p>Thanks LifeHacker.com<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"How to Crack a Wi-Fi Network's WEP Password with BackTrack\" src=\"http:\/\/img.gawkerassets.com\/img\/17idgc21242wbjpg\/original.jpg\" alt=\"How to Crack a Wi-Fi Network's WEP Password with BackTrack\" width=\"640\" height=\"360\" \/><\/p>\n<p>You already know that if you want to lock down your Wi-Fi network, you should opt for WPA encryption because WEP is easy to crack. But did you know how easy? Take a look.<\/p>\n<p><em>Note: This post demonstrates how to crack WEP passwords, an older  and less often used network security protocol. If the network you want  to crack is using the more popular WPA encryption, see our guide to cracking a Wi-Fi network&#8217;s WPA password with Reaver instead.<\/em><\/p>\n<p>Today we&#8217;re going to run down, step-by-step, how to crack a Wi-Fi  network with WEP security turned on. But first, a word: Knowledge is  power, but power doesn&#8217;t mean you should be a jerk, or do anything  illegal. Knowing how to pick a lock doesn&#8217;t make you a thief. Consider this post educational, or a proof-of-concept intellectual exercise.<\/p>\n<p>Dozens of tutorials on how to crack WEP are already all over the  internet using this method. Seriously\u2014Google it. This ain&#8217;t what you&#8217;d  call &#8220;news.&#8221; But what is surprising is that someone like me, with  minimal networking experience, can get this done with free software and a  cheap Wi-Fi adapter. Here&#8217;s how it goes.<\/p>\n<h3>What You&#8217;ll Need<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"How to Crack a Wi-Fi Network's WEP Password with BackTrack\" src=\"http:\/\/cache.gawker.com\/assets\/images\/lifehacker\/2009\/07\/alfa_01.png\" alt=\"How to Crack a Wi-Fi Network's WEP Password with BackTrack\" width=\"150\" height=\"200\" align=\"right\" \/>Unless  you&#8217;re a computer security and networking ninja, chances are you don&#8217;t  have all the tools on hand to get this job done. Here&#8217;s what you&#8217;ll  need:<\/p>\n<ul>\n<li><strong>A compatible wireless adapter<\/strong>\u2014This is the biggest  requirement. You&#8217;ll need a wireless adapter that&#8217;s capable of packet  injection, and chances are the one in your computer is not. After  consulting with my friendly neighborhood security expert, I purchased an  Alfa AWUS050NH USB adapter, pictured here, and it set me back about $50  on Amazon. <em>Update: Don&#8217;t do what I did. Get the Alfa AWUS036H, not the US050NH, instead.<\/em> <a href=\"http:\/\/www.youtube.com\/watch?v=oHq-cKoYcr8\">The guy in this video<\/a> below is using a $12 model he bought on Ebay (and is even <a href=\"http:\/\/www.youtube.com\/watch?v=bFlOHMj7Qoc\">selling his router of choice<\/a>). There are <a href=\"http:\/\/www.aircrack-ng.org\/doku.php?id=compatible_cards\">plenty of resources on getting aircrack-compatible adapters out there<\/a>.<\/li>\n<li><strong><a href=\"http:\/\/www.backtrack-linux.org\/\">A BackTrack Live CD<\/a><\/strong>. We already took you on a <a href=\"http:\/\/lifehacker.com\/5166530\/backtrack-is-a-security+focused-live-cd-packed-with-system-tools\">full screenshot tour of how to install and use BackTrack 3<\/a>,  the Linux Live CD that lets you do all sorts of security testing and  tasks. Download yourself a copy of the CD and burn it, or load it up in  VMware to get started.<\/li>\n<li><strong>A nearby WEP-enabled Wi-Fi network.<\/strong> The signal should be  strong and ideally people are using it, connecting and disconnecting  their devices from it. The more use it gets while you collect the data  you need to run your crack, the better your chances of success.<\/li>\n<li><strong>Patience with the command line.<\/strong> This is an ten-step process  that requires typing in long, arcane commands and waiting around for  your Wi-Fi card to collect data in order to crack the password. Like the  doctor said to the short person, be a little patient.<\/li>\n<\/ul>\n<h3>Crack That WEP<\/h3>\n<p>To crack WEP, you&#8217;ll need to launch Konsole, BackTrack&#8217;s built-in  command line. It&#8217;s right there on the taskbar in the lower left corner,  second button to the right. Now, the commands.<\/p>\n<p>First run the following to get a list of your network interfaces:<\/p>\n<blockquote><p><code>airmon-ng<\/code><\/p><\/blockquote>\n<p>The only one I&#8217;ve got there is labeled <code>ra0<\/code>. Yours may be  different; take note of the label and write it down. From here on in,  substitute it in everywhere a command includes (interface).<\/p>\n<p>Now, run the following four commands. See the output that I got for them in the screenshot below.<\/p>\n<blockquote><p><code><br \/>\nairmon-ng stop (interface)<br \/>\nifconfig (interface) down<br \/>\nmacchanger --mac 00:11:22:33:44:55 (interface)<br \/>\nairmon-ng start (interface)<\/code><\/p><\/blockquote>\n<p><a rel=\"lytebox\" href=\"http:\/\/img.gawkerassets.com\/img\/17ggkrsub9llbpng\/original.png\"><img decoding=\"async\" title=\"How to Crack a Wi-Fi Network's WEP Password with BackTrack\" src=\"http:\/\/img.gawkerassets.com\/img\/17ggkrsub9llbpng\/medium.png\" alt=\"How to Crack a Wi-Fi Network's WEP Password with BackTrack\" width=\"300\" \/><\/a> If you don&#8217;t get the same results from these commands as pictured here,  most likely your network adapter won&#8217;t work with this particular crack.  If you do, you&#8217;ve successfully &#8220;faked&#8221; a new MAC address on your  network interface, 00:11:22:33:44:55.<\/p>\n<p>Now it&#8217;s time to pick your network. Run:<\/p>\n<blockquote><p><code>airodump-ng (interface)<\/code><\/p><\/blockquote>\n<p>To see a list of wireless networks around you. When you see the one  you want, hit Ctrl+C to stop the list. Highlight the row pertaining to  the network of interest, and take note of two things: its BSSID and its  channel (in the column labeled CH), as pictured below. Obviously the  network you want to crack should have WEP encryption (in the ENC)  column, not WPA or anything else.<\/p>\n<p><a rel=\"lytebox\" href=\"http:\/\/img.gawkerassets.com\/img\/17ggkrut97td8png\/original.png\"><img decoding=\"async\" title=\"How to Crack a Wi-Fi Network's WEP Password with BackTrack\" src=\"http:\/\/img.gawkerassets.com\/img\/17ggkrut97td8png\/medium.png\" alt=\"How to Crack a Wi-Fi Network's WEP Password with BackTrack\" width=\"300\" \/><\/a> Like I said, hit Ctrl+C to stop this listing. (I had to do this once or  twice to find the network I was looking for.) Once you&#8217;ve got it,  highlight the BSSID and copy it to your clipboard for reuse in the  upcoming commands.<\/p>\n<p>Now we&#8217;re going to watch what&#8217;s going on with that network you chose and capture that information to a file. Run:<\/p>\n<blockquote><p><code>airodump-ng -c (channel) -w (file name) --bssid (bssid) (interface)<\/code><\/p><\/blockquote>\n<p>Where (channel) is your network&#8217;s channel, and (bssid) is the BSSID  you just copied to clipboard. You can use the Shift+Insert key  combination to paste it into the command. Enter anything descriptive for  (file name). I chose &#8220;yoyo,&#8221; which is the network&#8217;s name I&#8217;m cracking.<\/p>\n<p><a rel=\"lytebox\" href=\"http:\/\/img.gawkerassets.com\/img\/17ggkrutbx04dpng\/original.png\"><img decoding=\"async\" title=\"How to Crack a Wi-Fi Network's WEP Password with BackTrack\" src=\"http:\/\/img.gawkerassets.com\/img\/17ggkrutbx04dpng\/medium.png\" alt=\"How to Crack a Wi-Fi Network's WEP Password with BackTrack\" width=\"300\" \/><\/a><\/p>\n<p>You&#8217;ll get output like what&#8217;s in the window in the background  pictured below. Leave that one be. Open a new Konsole window in the  foreground, and enter this command:<\/p>\n<blockquote><p><code>aireplay-ng -1 0 -a (bssid) -h 00:11:22:33:44:55 -e (essid) (interface)<\/code><\/p><\/blockquote>\n<p>Here the ESSID is the access point&#8217;s SSID name, which in my case is <code>yoyo<\/code>. What you want to get after this command is the reassuring &#8220;Association successful&#8221; message with that smiley face.<\/p>\n<p><a rel=\"lytebox\" href=\"http:\/\/img.gawkerassets.com\/img\/17ggkrut9v67spng\/original.png\"><img decoding=\"async\" title=\"How to Crack a Wi-Fi Network's WEP Password with BackTrack\" src=\"http:\/\/img.gawkerassets.com\/img\/17ggkrut9v67spng\/medium.png\" alt=\"How to Crack a Wi-Fi Network's WEP Password with BackTrack\" width=\"300\" \/><\/a><\/p>\n<p>You&#8217;re almost there. Now it&#8217;s time for:<\/p>\n<blockquote><p><code>aireplay-ng -3 -b (bssid) -h 00:11:22:33:44:55 (interface)<\/code><\/p><\/blockquote>\n<p>Here we&#8217;re creating router traffic to capture more throughput faster  to speed up our crack. After a few minutes, that front window will start  going crazy with read\/write packets. (Also, I was unable to surf the  web with the <code>yoyo<\/code> network on a separate computer while this  was going on.) Here&#8217;s the part where you might have to grab yourself a  cup of coffee or take a walk. Basically you want to wait until enough  data has been collected to run your crack. Watch the number in the  &#8220;#Data&#8221; column\u2014you want it to go above 10,000. (Pictured below it&#8217;s only  at 854.)<\/p>\n<p>Depending on the power of your network (mine is inexplicably low at -32 in that screenshot, even though the <code>yoyo<\/code> AP was in the same room as my adapter), this process could take some  time. Wait until that #Data goes over 10k, though\u2014because the crack  won&#8217;t work if it doesn&#8217;t. In fact, you may need more than 10k, though  that seems to be a working threshold for many.<\/p>\n<p><a rel=\"lytebox\" href=\"http:\/\/img.gawkerassets.com\/img\/17ggkrwseb5uipng\/original.png\"><img decoding=\"async\" title=\"How to Crack a Wi-Fi Network's WEP Password with BackTrack\" src=\"http:\/\/img.gawkerassets.com\/img\/17ggkrwseb5uipng\/medium.png\" alt=\"How to Crack a Wi-Fi Network's WEP Password with BackTrack\" width=\"300\" \/><\/a><\/p>\n<p>Once you&#8217;ve collected enough data, it&#8217;s the moment of truth. Launch a  third Konsole window and run the following to crack that data you&#8217;ve  collected:<\/p>\n<blockquote><p><code>aircrack-ng -b (bssid) (file name-01.cap)<\/code><\/p><\/blockquote>\n<p>Here the filename should be whatever you entered above for (file  name). You can browse to your Home directory to see it; it&#8217;s the one  with .cap as the extension.<\/p>\n<p>If you didn&#8217;t get enough data, aircrack will fail and tell you to try again with more. If it succeeds, it will look like this:<\/p>\n<div>\n<div><a rel=\"lytebox\" href=\"http:\/\/img.gawkerassets.com\/img\/17ggkrws8f1gepng\/original.png\">Full size<\/a><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/img.gawkerassets.com\/img\/17ggkrws8f1gepng\/medium.png\" alt=\"\" width=\"300\" height=\"213\" \/><\/p>\n<\/div>\n<p>The WEP key appears next to &#8220;KEY FOUND.&#8221; Drop the colons and enter it to log onto the network.<\/p>\n<h3>Problems Along the Way<\/h3>\n<p>With this article I set out to prove that cracking WEP is a  relatively &#8220;easy&#8221; process for someone determined and willing to get the  hardware and software going. I still think that&#8217;s true, but unlike the  guy in the video below, I had several difficulties along the way. In  fact, you&#8217;ll notice that the last screenshot up there doesn&#8217;t look like  the others\u2014it&#8217;s because it&#8217;s not mine. Even though the AP which I was  cracking was my own and in the same room as my Alfa, the power reading  on the signal was always around -30, and so the data collection was very  slow, and BackTrack would consistently crash before it was complete.  After about half a dozen attempts (and trying BackTrack on both my Mac  and PC, as a live CD and a virtual machine), I still haven&#8217;t captured  enough data for aircrack to decrypt the key.<\/p>\n<p>So while this process is easy in theory, your mileage may vary  depending on your hardware, proximity to the AP point, and the way the  planets are aligned. Oh yeah, and if you&#8217;re on deadline\u2014Murphy&#8217;s Law  almost guarantees it won&#8217;t work if you&#8217;re on deadline.<\/p>\n<hr \/>\n<p>To see the video version of these exact instructions, check out this dude&#8217;s YouTube video.<\/p>\n<p><iframe loading=\"lazy\" title=\"How to Easily Crack WEP Keys with Backtrack 3\" width=\"640\" height=\"480\" src=\"https:\/\/www.youtube.com\/embed\/kDD9PjiQ2_U?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I read LifeHacker pretty often, I came across this article that was interesting. I tried it and verified it worked so I wanted to post this on my site as well \ud83d\ude42 Thanks LifeHacker.com You already know that if you want to lock down your Wi-Fi network, you should opt for WPA encryption because WEP [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[33,19],"tags":[],"class_list":["post-716","post","type-post","status-publish","format-standard","hentry","category-sec-secops","category-wifi-101"],"_links":{"self":[{"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/posts\/716","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=716"}],"version-history":[{"count":4,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/posts\/716\/revisions"}],"predecessor-version":[{"id":720,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/posts\/716\/revisions\/720"}],"wp:attachment":[{"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=716"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=716"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=716"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}