Like every other website on the planet, SmallNetBuilder uses cookies. Our cookies track login status, but we only allow admins to log in anyway, so those don't apply to you. Any other cookies you pick up during your visit come from advertisers, which we don't control.
If you continue to use the site, you agree to tolerate our use of cookies. Thank you!

Router Charts

Click for Router Charts

Router Ranker

Click for Router Ranker

NAS Charts

Click for NAS Charts

NAS Ranker

Click for NAS Ranker

More Tools

Click for More Tools

Wireless How To

Introduction

aircrack first failed run

Our original WEP-cracking series appeared over two years ago and is still among the most popular articles on SmallNetBuilder. But to anyone trying to use the articles, it quickly becomes apparent that they were out of date and in desperate need of updating. That said, the originals still contain a lot of very relevant information so we suggest you read at least Part 1 before you start, as it contains some helpful background information.

Before we get started, however, let us make a few points that may save some readers the time and effort of trying these techniques:

  • To successfully follow this How To, you need basic familiarity with networking terminology and principles. You should be comfortable with using command line-based programs and basic familiarity with Linux will be helpful too.

  • These procedures assume that the target WLAN has at least one client associated with an AP or wireless router. They will not work with an AP that has no associated clients.

  • Accessing anyone else's network other than your own without the network owner's consent is at worst illegal in some U.S. jurisdictions and at best, not a neighborly thing to do.

    SmallNetBuilder, Pudai, LLC and the authors do not condone or approve of illegal use of this tutorial in any way.

With that out of the way, let’s proceed. What do you need to crack a WEP-protected wireless network these days? The good news is you probably already have everything you need to do it, since, in the two years since the original article, there have been many advances in the open source and wireless exploit tool world.

Gone are the days of requiring expensive, hard-to-find hardware (like the two PRISM 2 Wi-Fi cards and two computers in the original tutorial). Many more of the popular chipsets are now supported. Also you can do it all on a single machine!

The best WEP cracking toolset has been developed by the Aircrack-ng team, so that's what we're going to use. Aircrack-ng is a collection of programs aimed at WEP and WPA-PSK key cracking. While are are seven programs (plus a few Tools) in the suite, we'll be using four of them:

  • airmon-ng - for switching the wireless adapter into monitor mode
  • airodump-ng - for WLAN discovery and packet capture
  • aireplay-ng - for traffic generation
  • aircrack-ng - for recovering the WEP key

Although there are versions of the suite that run on Windows and even Zaurus (!) OSes, we're going to use the Linux version. Don't worry about not being a Linux expert, however, since we'll be using the BackTrack 2 (BT2) live CD, which will leave your Windows machine's hard drive unchanged. BT2 comes with the entire aircrack-ng suite already installed.

More Wireless

Zyxel logo

Is Cloud-Based Network Management Right for You? - Cloud managed networks aren't just for Enterprises anymore.

Wi-Fi System Tools
Check out our Wi-Fi System Charts, Ranker and Finder!

Featured Sponsors



Support Us!

If you like what we do and want to thank us, just buy something on Amazon. We'll get a small commission on anything you buy. Thanks!

Over In The Forums

RT-AC68UFirmware Version:384.6I enabled Let's encrypt immediately after last update and it worked smooth, no issues.Today I noticed the server certifi...
My ISP, Rogers, keeps emailing me to say I have a router running a DNS server that is accessible to the entire Internethttps://www.rogers.com/customer...
Hello all, I have been reading a bunch of post on here trying to figure out what to do. My situation is that i have is that i need(want) to upgrade my...
Gday AllSo for some reason my DSL68U lost its portfowarding table. Not sure if it was after the latest update (3.0.0.4.384_21128) (i assume so, but I ...
I'm unclear on the change made regarding DNSSEC validation enabled by default. My LAN is a bit old, and am running two VM DNS servers that do NOT supp...

Don't Miss These

  • 1
  • 2
  • 3