WEP
Manual Cracking WEP
You need to understand the goal: we are exploiting the mathematical weakness of WEP by capturing and re-injecting packets to force the Access Point (AP) to generate a high volume of Initialization Vectors (IVs). Once we have enough IVs, we can solve for the key.
Phase 1: Environment Setup
Put wlan2 into Monitor Mode:
airmon-ng start wlan6 Note: This usually creates an interface named wlan6mon.

Phase 2: The Attack Walkthrough (Multi-Tab)
Tab A: Targeted Capture
First, see the running networks

This tab stays open to collect the "votes" (IVs) needed to crack the key.
Monitor: Watch the
#Datacolumn. You need this number to start climbing fast.

Tab B: Fake Authentication (If no active clients connected to the AP, essential then)
We use wlan6mon to "introduce" ourselves to the AP. Without this, the AP will ignore our injected traffic.
Command Breakdown
aireplay-ng: The core tool used for 802.11 packet injection and generation.-1 6000: Specifies Fake Authentication mode. The6000tells the tool to re-authenticate every 6,000 seconds to keep the connection alive.-o 1: Sends only one set of authentication/association packets at a time (standard for most APs).-q 10: Sends "keep-alive" packets every 10 seconds to ensure the AP doesn't drop your connection due to inactivity.-e SweetB-WEP: The ESSID (name) of the target network.-a 02:00:00:00:00:00: The BSSID (MAC address) of the target Access Point.-h 02:00:00:00:06:00: Your Source MAC address. This is the MAC of the interface you are using to attack (e.g.,wlan2mon).wlan2mon: The specific wireless interface you are using in monitor modeSuccess: Look for
Association successful :-) (AID: 1).

Same command with limited parameters

Tab C: ARP Replay Attack
This is the engine. It listens for a network packet and re-broadcasts it 500 times per second.
Command Breakdown
aireplay-ng: The tool used for 802.11 packet injection.-3: Specifies the ARP Request Replay attack mode.-b 02:00:00:00:00:00: Sets the BSSID (MAC address) of the target Access Point.-h 02:00:00:00:01:00: Sets the Source MAC address (usually your own interface's MAC or a successfully associated client).wlan6mon: The specific wireless interface you are using in monitor modeTroubleshooting: If data isn't rising, go to another tab and run
ping 192.168.8.5to generate the initial ARP packets the attack needs.

or use the following
Tab D: Cracking the Key
You can run this while the other tabs are still working. It will update as more IVs are captured.

Expected Results
IV Count: The attack will restart every 5,000 captured IVs until it finds the key.
Key Found: When successful, you will see
KEY FOUND! [ EA:BC:DE:F1:23 ](example key).Decryption: It should report
Decrypted correctly: 100%.
Automated WEP cracking with besside-ng
1. besside-ng (Automated WEP/WPA Attack Tool)
A tool that automatically captures handshakes for WPA/WPA2 networks and cracks WEP encryption.
2. -c 3 (Target Channel 3)
This forces
besside-ngto only scan and attack Wi-Fi networks on channel 3.Useful for faster attack execution instead of scanning all channels.
3. -b F0:9F:C2:71:22:11 (Target Specific BSSID)
F0:9F:C2:71:22:11 is the BSSID (MAC address of the target router/AP).
Ensures
besside-ngattacks only this specific access point rather than scanning for all available networks.
4. wlan2 (Wireless Interface)
Specifies that
wlan2is the wireless adapter being used.
5. -v (Verbose Mode)
Enables detailed output for better tracking of the attack progress.


Connecting to the cracked WEP Wifi Network
Once we have the password we can connect to the WEP network:
Create a configuration file to connect to the WEP network.
The content should look like this.
Now we can connect to the WEP network with our configuration file.
We should try to retrieve an IP address from the DHCP server.

Last updated