![]() ![]() ![]() Note: XP is soon to be discontinued and is currently a very insecure OS because of all it's non-updated security vulnerabilities.Īs long as you are only using aircrack-ng to pentest your own network, I will give you this advice. It's just a terminal by default but you can issue startx to get a DE and do whatever it is that you want to after you get the WEP keys - I have to tell you not crack your neighbor's wifi but solely your own, for security testing. It has no network manager or other processes that usually interfere with aircrack-ng and you are root by default, so you don't have to go through a lot of troubleshooting you would with a general purpose GNU/Linux distribution. Backtrack comes with the whole aircrack-ng suite pre-installed, as well as other wonderful networks tools such as nmap, wireshark and ettercap. Run it preferably on Backtrack since you are unfamiliar with *nix. The tutorial on WEP cracking is VERY CLEAR. You'll run everything from the terminal on a Linux distribution, there's no (good) GUI, and Windows' support for tools like that is just awful, as the documentation says. ![]() When i run GUI What? to use on Win XP Don't. ![]() You can use backtrack it's a penertration testing linux live cd that has aircrack already loaded.Įdit: I didn't see the question was that old, someone bumped it. I'd stay away from windows I heard you have to write your own dlls to get it working with your wifi card. While capturing you use aireplay do packet injection tricks.Īnd you use aircrack to crack the capture file and hopefully get a key out of it. So you switch your card into monitor mode with airmon It can also force ap dissasociations to capture wpa handshakes. You can use filters to just listen to traffic from specific aps and or channelsĪireplay: this does some nifty tricks, it's main one is arp replay this will decrease drastically the time it takes to crack wep. This will switch your wifi card into monitor modeĪircrack: this breaks wep and wpa ever by calculating for wep or bruteforcing for wpaĪirodump: this listens to all network traffic going through the air and captures wpa handshakes or wep ivs to a capture file. The capture file holds any handshakes or ivs that aircrack needs to break security,Īircrack-Ng is a suite of software, the main ones are: ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |