Backtrack WEP Cracking

The Wired Equivalent Privacy is an encryption algorithm that was introduced in 1997 for securing wireless networks and was designed to offer the privacy of a wired network in a wireless one. Known to have security flaws since 2001, WEP was superseded by WPA (Wi-Fi Protected Access) in recent years, but is still used in many wireless networks.

BackTrack is a Linux distribution which is distributed as a Live CD and can be used for performing security tests and other various tasks. Using BackTrack’s command line, called Konsole, and a few nifty commands, you can crack the WEP encryption and log onto the network. This tutorial uses BackTrack version 3, as version 4 is only in pre-release stage.

First and foremost, you will need a wireless adapter capable of packet injection and, of course, a wireless network nearby that uses WEP. The first thing you need to do is get a list of network interfaces and then fake a MAC address on your network interface. Next, you get a list of wireless network interfaces and look for one that uses WEP encryption. The final step is collecting enough data packets to make the crack successful (this requires that the signal is strong, so collecting of the data doesn’t take ages).

WEP has been cracked before and you can find lots of other tutorials on the Internet, so it’s no secret that it’s not a secure encryption standard. This one though can help even someone with just a little networking experience to successfully crack WEP. It only takes a few adequate tools and a little patience and voila! – you’re hacking. Detailed BackTrack commands, as well as screenshots and additional information is available in the link.

BackTrack WEP Cracking: [Link][via]