Like every other website on the planet, SmallNetBuilder uses cookies. Our cookies track login status, but we only allow admins to log in anyway, so those don't apply to you. Any other cookies you pick up during your visit come from advertisers, which we don't control.
If you continue to use the site, you agree to tolerate our use of cookies. Thank you!

Router Charts

Click for Router Charts

Router Ranker

Click for Router Ranker

NAS Charts

Click for NAS Charts

NAS Ranker

Click for NAS Ranker

More Tools

Click for More Tools

Wireless How To

Introduction

This article has been superceeded by How to Crack WEP...Reloaded.

Hundreds, perhaps thousands of articles have been written about the vulnerability of WEP (W ired E quivalent P rivacy), but how many people can actually break WEP encryption? Beginners to WEP cracking have often been frustrated by the many wireless cards available and their distribution-specific commands. And things are further complicated when the beginner is not familiar with Linux.

In this three part series, we will give you a step by step approach to breaking a WEP key. The approach taken will be to standardize as many variables as possible so that you can concentrate on the mechanics of WEP cracking without being hindered by hardware and software bugs. The entire attack is done with publicly available software and doesn't require special hardware - just a few laptops and wireless cards.

Gotcha!

Figure 1: Gotcha!

This first article will help you set up your wireless lab and guide you through the scanning portion of WEP cracking. After all, you will need to find and document the wireless networks before you can crack them. The second article will describe the stimulation of the target WLAN to generate traffic and the actual process of capturing data and cracking the WEP key. After reading these two articles, you should be able to break WEP keys in a matter of minutes. A third article will turn things around and describe how to defend against multiple skill levels of wireless intruders

NOTE!NOTES:

  • A description of the basic approach and techniques used in this How To can be found in The Feds can own your WLAN too.

  • You don't need to be a networking expert to successfully follow this How To, but you need basic familiarity with networking terminology and principles. You should know how to ping, open a Windows Command Prompt, enter command lines and know your way around the Windows networking properties screens.

More Wireless

Zyxel logo

Is Cloud-Based Network Management Right for You? - Cloud managed networks aren't just for Enterprises anymore.

Wi-Fi System Tools
Check out our Wi-Fi System Charts, Ranker and Finder!

Featured Sponsors



Support Us!

If you like what we do and want to thank us, just buy something on Amazon. We'll get a small commission on anything you buy. Thanks!

Over In The Forums

Currently i'm running Voxels latest build ( V1.0.2.54SF) which overall seems to work just fine. I know I can set a client device to low,medium,high,hi...
My routers traffic analyzer shows Wistron Infocomm (Zhongshan) Co as a client.Mostly no activity, but some days 3GB download.Any thoughts as to what t...
I enable stateful vs stateless in order to have routable IPV6 addresses.After doing that, and a quick restart of the router, I checked that the target...
Purchased a Blue Cave about a month ago. When I first installed it, I ran some speed tests that were coming in at 160mbps/160mbps - right where it sh...
I switched ISPs recently and now port 80 is closed and Let's Encrypt is unable to renew. Looking for a way now to circumvent this, any help would be g...

Don't Miss These

  • 1
  • 2
  • 3