Cracking WPA-PSK
As I mentioned in a previous blog, my team is working on a project where we perform a Man-in-the-Middle (MitM) attack on a WEP encrypted wireless network.
The point of the project is to demonstrate how quick and easy it is to hack a WEP encrypted wireless network and to discuss and encourage additional methods of wireless security.
As I searched for useful hack tools I became especially excited about Aircrack. Aircrack is a package of great wireless auditing tools. It includes:
- Airodump: 802.11 packet capture program
- Aireplay: 802.11 packet injection program
- Aircrack: static WEP and WPA-PSK key cracker
- Airdecap: decrypts WEP/WPA capture files
The amount of time it takes to hack an encrypted wireless network is dependent on the amount of traffic. Less traffic means the hack will take more time and vise versa. That's why the Aireplay tool is so exciting. It is basically a traffic generator, which enables the hacker to up the networks traffic level, thus speeding up the hack.
The other tools that caught my interest are Aircrack and Airdecap because they work for both WEP and WPA encryption, which in my experience thus far hacking tools are typically limited to WEP.
All IT/Tech geeks know that WEP can be cracked with relative ease, but what is not as well know is how quick/easy it is to crack WPA-PSK encrypted network. Since the tool exists we've decided to expand our scope to cracking a WPA-PSK encrypted network rather then a WEP encrypted network.
Now all of my comments on Aircrack thus far are only based on research. Hopefully we will be able to play with these tools tonight and find out how well they work. I will be sure to give a review of the package once we've finished our work.
If anyone has experience with this package I welcome your comments/lessons learned.
See also: WEP cracking
0 komentar:
Posting Komentar