FinIntrusion Kit includes a module to break the WEP and WPA/WPA2 (PSK mode) encryption. For this module it is necessary to have at least one connected Wireless Client.
In case a wireless network is encrypted using the WEP or WPA/WPA2 technology, select the encrypted network and press button.
The software will now try to automatically retrieve the WEP encryption or WPA/WPA pre-share key, which then can be used to join the network.
Example of a successful “WEP Crack”
This process should not take longer than 10 minutes. In case it cannot recover the key, try to restart the process. As this technique cannot work on all types of wireless networks, this might need to be done in a manual process.
Work flow:
Identify a WEP encrypted Wireless Network with minimum one connected Wireless Client.
The connected Wireless Client will be disconnected with de-authentication packages.
Target System reconnects to Access Point these packages will be captured in the background.
Start a replay attack and replay these fragments.
Access Point / Wireless Clients will be triggered to send more packets more encrypted Data packets / IVs will be captured.
If enough IVs are collected a WEP Crack could be successful.
Depending on the size of WEP key and if ASCII or HEX values were used, a different amount of packages must be captured.
Key Length
|
Encrypted Data Packages with different IVs
|
40 / 64 Bit ASCII
|
~ 30.000 Packages
|
40 / 64 Bit HEX
|
~ 40.000 Packages
|
104 / 128 Bit ASCII
|
~ 60.000 Packages
|
104 / 128 Bit HEX
|
~ 70.000 Packages
|
Share with your friends: |