Monday, October 27, 2014

WEP Auditing (Updates)

Two new WEP hacking features have been added to WAIDPS.
·         KoreK Chopchop Attack
·         Fragmentation Attack
Both methods need a wireless client to be present. Detail on both attack can be found on Aircrack-NG page (http://www.aircrack-ng.org/doku.php?id=korek_chopchop & http://www.aircrack-ng.org/doku.php?id=fragmentation)


Example of a KoreK Chopchop Attack
The screenshot below show the selection of the option. Simply press [Enter] while WEP attacking is in progress to bring up the "Auditing Menu". Select [O1]  for KoreK Chopchop attack.


Once the option is entered, it will start to read packets from any Client MAC address. After chosen a packet to use, decryption will begin. It may take up to a minute or more.


Once decryption of ARP packet is completed, a Keystream (XOR) packet will be saved with the AP name. WAIDPS will automatically replay the generated packet shown above. Cracking of the WEP will be as per normal which replaying of the ARP packet till it is cracked.

Example on Replaying of Existing Keystream  (KoreK)
If an existing decrypted ARP packet is found, user do not need to redo the KoreK Chopchop again. User can select the existing decrypted ARP packet to create another new Keystream file as shown below.



Example of a Fragmentation Attack
Cracking using the Fragmentation Attack is similar to the KoreK Chopchop attack. Simply press [Enter] while WEP attacking is in progress to bring up the "Auditing Menu". Select [O2]  for Fragmentation Attack.


Once the 1500 bytes of PRGA (pseudo random generation algorithm) is obtained. It will create a ARP packet and WAIDPS will automatically replay the generated packet shown above. Cracking of the WEP will be as per normal which replaying of the ARP packet till it is cracked.

Example on Replaying of Existing Keystream  (Fragmentation)
Similar to Korek chopchop, if an existing keystream is found, user do not need to launch the Fragmentation attack again. Simply use the existing keystream to generate a ARP packet for replaying.




NOTE: KoreK Chopchop and Fragmentation attack require a client to be connected to the Access Point. It may not be as easy as seem to be.. in most cases, attack failed due to unsupported chipset, improper patch for injection and much more other reason. Refer to Aircrack-NG page for detail.



Please support my page by liking it https://www.facebook.com/syworks
Visit GitHub        - https://github.com/SYWorks/waidps




6 comments:

Belkhadir Anas said...

syntax error with tab please send file again without error i can't do it is so much tab to do it in your code by the way thanks

Bavarian said...

Thank you dude,good job.Do i need aircrack compatible adapter?Why do i have receive :

"[!] Unable to find Airodump-NG output file.. Interface [ wlan0 ] may be down..
Try disconnect and reconnect the wireless interface if possible to see if it solve the problem..
"

dC@l said...

I'm getting the same error as Bavarian: "Unable to find Airodump-NG output file.. Interface"

airocrack-ng is installed, this is a straight up Kali install, and I can put the interface into monitor mode with no issue. Thoughts? I've very excited to use the tool.

thanks!

Unknown said...

I am getting this same error any idea how to fix it?
Unable to find Airodump-NG output file.. Interface [ wlan1 ] may be down..
Try disconnect and reconnect the wireless interface if possible to see if it solve the problem..

Anonymous said...

Same here.

Unknown said...

Run it from terminal not SSH. TERMINAL as in the application in X