tutorial cracking wifi wep backtrack 5

Backtrack or any other Linux distro with aircrack-ng installed.
You can find compatible wifi card lists here.
Now youll have to capture at least 20,000 data packets to crack WEP.This can be done in two ways, The first one would be a (passive attack ) wait for a client to connect to the AP and then start capturing the data packets but.Cracking WEP key using Aircrack Now its time crack the WEP key from the captured data, Enter the following commands in a new konsole to crack the WEP key aircrack-ng (name of the file ) In my case i enter aircrack-ng rhawep-0.1-cap With.Hope You Enjoyed this tutorial,For further Doubts and clarifications please pass your comments About The Author This article is writen by John Jeffery, He is the owner of Hackholic where he writes security related stuffs, If you are interested in writting a guest post.If this step was successful you'll see Lot of data packets in the airodump capture as shown.As announced before we would be writing related to wifi attacks and security, This post is the second part of our series on wifi attacks and Security, In the first part we discussed about various terminologies related to wifi attacks and security and discussed couple of attacks.Wait till it reaches 20000 packets, best would be to wait till it reaches around 80,000 to 90,000 packets.Its simple more the packets less the time to crack.Once youve captured enough number of packets, close all the process's by clicking the into mark which.Most importantly, you should restrict monitoring to a single channel to speed up data collection, otherwise the wireless card has to alternate between all channels.You can restrict the capture by giving in the following commands airodump-ng mon0 -bssid -c (channel ) -w (file name.Finding a suitable Target, after putting your card into monitor mode,we need to find a network that is protected by WEP.Security Issues With WEP, wEP (Wired Equivalent Privacy) was proved full of flaws back in 2001, WEP protocol itself has some weakness which allows the attackers to crack them in no time.Putting your WiFi Adapter on Monitor Mode.Remove the colons deviance call of duty 2 crack from the output and youll have your WEP Key.To begin, youll need to first put your wireless adapter into monitor mode, Monitor mode is the mode whereby your card can listen to every packet in the air, You can put your card into monitor mode by typing in the following commands airmon-ng start.After doing a fake authentication,now its time to generate and inject Arp packets.The biggest flaw probably in a WEP key is that it supports only 40bit encryption which means that there are 16million possibilities only.Procedure :-, first Login to your Backtrack / Linux distro and plug in your Wifi adpter, Open a new konsole and type in the following commands ifconfig wlan0 up where wlan0 is the name of the wireless card,it can be different.To see all wireless cards.Attacking The Target, now to crack the WEP key you'll have to capture the targets data into a file, To do this we use airodump tool again, but with some additional switches to target a specific AP and channel.
Using Aireplay to Speed up the cracking.
This can be done very easily by entering the following commands aireplay-ng - 1 3 -a (bssid of the target ) (interface).