The Muzic

gak usah liatin gue, cuekin aja..

Global Variables


Click here for Myspace Layouts

Kamis, 02 Februari 2012

How To Crack a Wi-Fi Network

·
How to Crack a Wi-Fi Network's WEP Password with BackTrack
Anda sudah tahu bahwa jika Anda ingin mengunci jaringan Wi-Fi Anda, Anda harus memilih untuk enkripsi WPA karena WEP mudah retak. Tapi apakah Anda tahu caramudah? Coba lihat.
Jika jaringan Anda ingin menguji menjalankan enkripsi WPA lebih populer, lihatpanduan kami untuk cracking Wi-Fi jaringan sandi WPA dengan Reaver gantinya.
Hari ini kita akan turun, langkah demi langkah, cara crack jaringan Wi-Fi dengankeamanan WEP diaktifkan. Tapi pertama, sebuah kata: Pengetahuan adalah kekuatan, tetapi kekuasaan tidak berarti Anda harus menjadi brengsek, atau melakukan sesuatu yang ilegal. Mengetahui bagaimana untuk mengambil kunci tidak membuat Anda seorang pencuri. Pertimbangkan ini pasca pendidikan, atau latihanbukti-konsep intelektual.
Puluhan tutorial tentang cara crack WEP sudah seluruh internet menggunakan metode ini. Serius-Google itu. Ini bukan apa yang akan Anda sebut "berita." Tapi apa yang mengejutkan adalah bahwa orang seperti saya, dengan pengalaman jaringan minimal, bisa mendapatkan ini dilakukan dengan perangkat lunak gratis danWi-Fi adaptor murah. Berikut ini bagaimana kelanjutannya

Apa yang Anda butuhkan

How to Crack a Wi-Fi Network's WEP Password with BackTrackKecuali Anda seorang keamanan komputer dan ninja jaringan, kemungkinan Anda tidak memiliki semua alat di tangan untuk mendapatkan pekerjaan ini dilakukan.Inilah yang Anda perlu:Sebuah nirkabel yang kompatibel adaptor-Ini adalah kebutuhan terbesar. Anda akan memerlukan adaptor nirkabel yang mampu injeksi paket, dan kemungkinan salah satu di komputer Anda tidak. Setelah berkonsultasi dengan ahli keamanan ramah lingkungan saya, saya membeli sebuah Alfa AWUS050NH USB adaptor, digambarkan di sini, dan itu membuat saya kembali sekitar $ 50 di Amazon.Update: Jangan lakukan apa yang saya lakukan. Dapatkan AWUS036H Alfa, tidak US050NH, bukan. Orang di videobelow ini menggunakan model 12 $ dia membeli di Ebay (dan bahkan menjual router nya pilihan). Ada banyak sumber untuk mendapatkan aircrack-kompatibel adaptor di luar sana.Sebuah BackTrack 3 Live CD. Kami sudah membawa Anda pada tur screenshot penuh tentang bagaimana menginstal dan menggunakan BackTrack 3, Linux Live CD yang memungkinkan Anda melakukan banyak pengujian keamanan dan tugas.Download diri Anda salinan dari CD dan membakarnya, atau beban itu di VMware untuk memulai. (Saya mencoba BackTrack 4 pra-rilis, dan tidak berhasil serta BT3 Jangan sendiri. Nikmat dan tetap dengan BackTrack 3 untuk saat ini.)Sebuah WEP-enabled terdekat Wi-Fi. Sinyal harus kuat dan idealnya orang yang menggunakannya, menghubungkan dan memutuskan perangkat mereka dari itu.Penggunaan lebih mendapat saat Anda mengumpulkan data yang Anda butuhkan untuk menjalankan retak Anda, kemungkinan Anda lebih baik dari kesuksesan.Kesabaran dengan baris perintah. Ini adalah proses sepuluh-langkah yang membutuhkan mengetikkan panjang, perintah misterius dan menunggu sekitar untuk kartu Wi-Fi Anda untuk mengumpulkan data untuk memecahkan sandi. Seperti kata dokter kepada orang yang pendek, menjadi pasien sedikit.Crack itu WEP
Untuk crack WEP, Anda harus memulai Konsole, built-in baris perintah BackTrack itu. Ada persis di sana pada taskbar di pojok kiri bawah, tombol kedua ke kanan.Sekarang, perintah-perintah.Pertama jalankan berikut untuk mendapatkan daftar antarmuka jaringan Anda:airmon-ngSatu-satunya aku ada diberi label ra0. Anda mungkin berbeda; perhatikan label dan menuliskannya. Dari sini di dalam, pengganti di mana-mana termasuk perintah (antarmuka).Sekarang, jalankan perintah berikut empat. Lihat output yang saya punya untuk mereka dalam gambar di bawah.

airmon-ng stop (interface)
ifconfig (interface) down
macchanger --mac 00:11:22:33:44:55 (interface)
airmon-ng start (interface)
How to Crack a Wi-Fi Network's WEP Password with BackTrackIf you don't get the same results from these commands as pictured here, most likely your network adapter won't work with this particular crack. If you do, you've successfully "faked" a new MAC address on your network interface, 00:11:22:33:44:55.
Now it's time to pick your network. Run:
airodump-ng (interface)
To see a list of wireless networks around you. When you see the one you want, hit Ctrl+C to stop the list. Highlight the row pertaining to the network of interest, and take note of two things: its BSSID and its channel (in the column labeled CH), as pictured below. Obviously the network you want to crack should have WEP encryption (in the ENC) column, not WPA or anything else.
How to Crack a Wi-Fi Network's WEP Password with BackTrackLike I said, hit Ctrl+C to stop this listing. (I had to do this once or twice to find the network I was looking for.) Once you've got it, highlight the BSSID and copy it to your clipboard for reuse in the upcoming commands.
Now we're going to watch what's going on with that network you chose and capture that information to a file. Run:
airodump-ng -c (channel) -w (file name) --bssid (bssid) (interface)
Where (channel) is your network's channel, and (bssid) is the BSSID you just copied to clipboard. You can use the Shift+Insert key combination to paste it into the command. Enter anything descriptive for (file name). I chose "yoyo," which is the network's name I'm cracking.
How to Crack a Wi-Fi Network's WEP Password with BackTrack
You'll get output like what's in the window in the background pictured below. Leave that one be. Open a new Konsole window in the foreground, and enter this command:
aireplay-ng -1 0 -a (bssid) -h 00:11:22:33:44:55 -e (essid) (interface)
Here the ESSID is the access point's SSID name, which in my case is yoyo. What you want to get after this command is the reassuring "Association successful" message with that smiley face.
How to Crack a Wi-Fi Network's WEP Password with BackTrack
You're almost there. Now it's time for:
aireplay-ng -3 -b (bssid) -h 00:11:22:33:44:55 (interface)
Here we're creating router traffic to capture more throughput faster to speed up our crack. After a few minutes, that front window will start going crazy with read/write packets. (Also, I was unable to surf the web with the yoyo network on a separate computer while this was going on.) Here's the part where you might have to grab yourself a cup of coffee or take a walk. Basically you want to wait until enough data has been collected to run your crack. Watch the number in the "#Data" column—you want it to go above 10,000. (Pictured below it's only at 854.)
Depending on the power of your network (mine is inexplicably low at -32 in that screenshot, even though the yoyo AP was in the same room as my adapter), this process could take some time. Wait until that #Data goes over 10k, though—because the crack won't work if it doesn't. In fact, you may need more than 10k, though that seems to be a working threshold for many.
How to Crack a Wi-Fi Network's WEP Password with BackTrack
Once you've collected enough data, it's the moment of truth. Launch a third Konsole window and run the following to crack that data you've collected:
aircrack-ng -b (bssid) (file name-01.cap)
Here the filename should be whatever you entered above for (file name). You can browse to your Home directory to see it; it's the one with .cap as the extension.
If you didn't get enough data, aircrack will fail and tell you to try again with more. If it succeeds, it will look like this:
The WEP key appears next to "KEY FOUND." Drop the colons and enter it to log onto the network.




Problems Along the Way

With this article I set out to prove that cracking WEP is a relatively "easy" process for someone determined and willing to get the hardware and software going. I still think that's true, but unlike the guy in the video below, I had several difficulties along the way. In fact, you'll notice that the last screenshot up there doesn't look like the others—it's because it's not mine. Even though the AP which I was cracking was my own and in the same room as my Alfa, the power reading on the signal was always around -30, and so the data collection was very slow, and BackTrack would consistently crash before it was complete. After about half a dozen attempts (and trying BackTrack on both my Mac and PC, as a live CD and a virtual machine), I still haven't captured enough data for aircrack to decrypt the key.
So while this process is easy in theory, your mileage may vary depending on your hardware, proximity to the AP point, and the way the planets are aligned. Oh yeah, and if you're on deadline—Murphy's Law almost guarantees it won't work if you're on deadline.

0 komentar:

Posting Komentar

handapeunpost