WEP stands for Wired Equivalent Privacy
WEP is used to secure wireless networks from eavesdroppers
WEP usually takes hours to crack
WEP has always been a long and tedious job, but this tutorial you crack it in 3 minutes
1. Run Kismet to find your target network. Get the SSID and the channel.
2. Run Airodump and start capturing data.
3. With Aireplay, start replaying a packet on the target network. (You can find a â€˜good packetâ€™ by looking at the BSSID MAC on Kismet and comparing it to the captured packetâ€™s BSSID MAC).
4. Watch as Airodump goes crazy with new IVs. Thanks to Aireplay.
5. Stop Airodump when you have about 1,000 IVs.
6. Run Aircrack on the captured file.
7. You should see the WEP key infront of you now.
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system
It is designed for Linux.
You can download it at www.kismetwireless.net
A windows version can be downloaded at Renderlab
-Aircrack (Includes Airodump, Aireplay, Aircrack and optional Airdecap for decrypting WEP/WPA capture files)
Aircrack is the 802.11 WEP and WPA-PSK keys cracking program that can recover this keys once enough encrypted packets have been captured with airodump.
Airdecap is used to decrypt WEP/WPA capture files.
Airmon can be used to configure the wireless card
Aireplay is used to inject frames.
Airodump is used for packet capturing of raw 802.11 frames and is particularly suitable for collecting WEP IVs (initialization vectors) for the intent of using them with aircrack-ng.
Download the whole suit at Aircrack