Communicate via an WEP-encrypted access point with easside-ng

Easside-ng is an auto-magic tool which allows you to communicate via an WEP-encrypted access point (AP) without knowing the WEP key. It first identifies a network, then proceeds to associate with it, obtain PRGA (pseudo random generation algorithm) xor data, determine the network IP scheme and then setup a TAP interface so that you can communicate with the AP without requiring the WEP key. All this is done without your intervention.

easside-ng menu

root@kali:~# easside-ng -h

Easside-ng 1.2 rc4 - (C) 2007, 2008, 2009 Andrea Bittau

Usage: easside-ng <options>


-h                : This help screen
-v   <victim mac> : Victim BSSID
-m      <src mac> : Source MAC address
-i           <ip> : Source IP address
-r    <router ip> : Router IP address
-s     <buddy ip> : Buddy-ng IP address (mandatory)
-f        <iface> : Interface to use (mandatory)
-c      <channel> : Lock card to this channel
-n                : Determine Internet IP only

easside-ng Usage Example

First, run buddy-ng, then launch the easside-ng attack, specifying as many of the options as you can.

root@kali:~# buddy-ng
Waiting for connexion
root@kali:~# easside-ng -v de:ad:be:ef:ca:fe -m 3c:46:d8:4e:ef:aa -s -f wlan0mon -c 6
Setting tap MTU
Sorting out wifi MAC



  • Author: Thomas d’Otreppe, Original work: Christophe Devine
  • License: GPLv2

Check Also

SamSam Ransomware

SamSam Ransomware

The Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) and the …

New Exploits for Unsecure SAP Systems - blackMORE Ops

New Exploits for Unsecure SAP Systems

A presentation at the April 2019 Operation for Community Development and Empowerment (OPCDE) cybersecurity conference describes SAP systems with unsecure configurations exposed to the internet. Typically, SAP systems are not intended to be exposed to the internet, as it is an untrusted network. Malicious cyber actors can attack and compromise these unsecure systems with publicly available exploit tools, termed “10KBLAZE.” The presentation detailed the new exploit tools and reports on systems exposed to the internet.

Use, Twitter, Facebook, or Google+ accounts to comment (anonymous comments allowed). Leave your solution to help others.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Privacy Policy on Cookies Usage

Some services used in this site uses cookies to tailor user experience or to show ads.