Network encryption cracking


Network encryption cracking

Network encryption cracking is the breaching of network encryptions (e.g., WEP, WPA, ...), usually through the use of a special encryption cracking software. It may be done through a range of attacks (active and passive) including injecting traffic, decrypting traffic, and dictionary-based attacks.

Contents

Methods

As mentioned above, several types of attacks are possible. More precisely they are:

  • Decrypting traffic based on tricking access points (active attack)
  • Injecting traffic based on known plaintext (active attack)
  • Gathering traffic and performing brute force/dictionary based attacks
  • Decrypting traffic using statistical analysis (passive attack)

Injecting traffic

Injecting traffic means inserting forged encrypted messages into the network. It may be done if either the key is known (to generate new messages), or if the key is not known and only an encrypted message and plaintext message is gathered, through comparison of the two. Programs able to do the latter are Aireplay and WepWedgie.

Decrypting

Decryption often requires 2 tools; 1 for gathering packets and another for analysing the packet and determining the key. Gathering packets may be done through tools as WireShark, Prismdump and cracking may be done through tools such as WEPCrack, AirSnort, AirCrack, and WEPLab.

When gathering packets, often a great amount of them are required to perform cracking. Depending on the attack used, 5-16 million frames may be required. The attack command itself, however, is surprisingly simple.

WEPCrack

Commands to be inputted into WEPCrack are:

perl \progra~1\wepcrack\pcap-getIV.pl

This command generates a log-file (ivfile.log) from a captured packet obtained by WireShark or prismdump A packet with at least 5 million frames is required.

perl \progra~1\wepcrack\wepcrack\.pl ivfile.log

This command asks WEPCrack to determine the key from the log file.[1]

AirCrack

Aircrack is another program that's even simpler to use, as no command need to be entered; instead the user is asked to type in some parameters and click some buttons.

First airodump is started to gather the packets; herefore channel and MAC-filter are asked, yet the user does not need to know them per se (instead 0 and p may be inputted respectively). Then, AirCrack is started, the file just created by airodump is accessed, a 0 needs to be entered and the program determines the key.

AirSnort

AirSnort is an even simpler program, as it is completely interface-based. As the attack is only a simple brute-force attack however, cracking the encryption can take a while (from several days to a few weeks). Especially if traffic is low (only 4 users or so on network, the cracking will take at least 2 weeks).

Comparison of tools

A comparison of the tools noted above may be found at Security Focus.

References

  1. ^ Hacking Wireless Networks for Dummies

Wikimedia Foundation. 2010.

Look at other dictionaries:

  • Cracking of wireless networks — is the penetration of wireless networks. A wireless network can be penetrated in a number of ways. These ways vary greatly in the level of computer skill and commitment they require. Once within a network, a skilled hacker can modify software,… …   Wikipedia

  • Data Encryption Standard — The Feistel function (F function) of DES General Designers IBM First publis …   Wikipedia

  • Password cracking — is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user recover a… …   Wikipedia

  • AACS encryption key controversy — A controversy surrounding the AACS cryptographic key arose in April 2007 when the Motion Picture Association of America and the Advanced Access Content System Licensing Administrator, LLC (AACS LA) began issuing demand letters[1] to websites… …   Wikipedia

  • Virtual Network Computing — In computing, Virtual Network Computing (VNC) is a graphical desktop sharing system which uses the RFB protocol to remotely control another computer. It transmits the keyboard and mouse events from one computer to another, relaying the graphical… …   Wikipedia

  • Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… …   Wikipedia

  • Wireless hacking — In security breaches, wireless hacking is the unauthorized use or penetration of a wireless network. A wireless network can be penetrated in a number of ways. There are methods ranging from those that demand a high level of technological skill… …   Wikipedia

  • Thebroken — Infobox Podcast width = title = thebroken caption = Title for thebroken videocast hosting = Dan Huard Kevin Rose language = English rss = [http://revision3.com/thebroken/feed/quicktime large QuickTime (Large)]… …   Wikipedia

  • Cypherpunk — Not to be confused with Cyberpunk. A cypherpunk is an activist advocating widespread use of strong cryptography as a route to social and political change. Originally communicating through the Cypherpunks electronic mailing list, informal groups… …   Wikipedia

  • Brute-force attack — The EFF s US$250,000 DES cracking machine contained over 1,800 custom chips and could brute force a DES key in a matter of days. The photograph shows a DES Cracker circuit board fitted with 32 Deep Crack chips and some control chips. In… …   Wikipedia


We are using cookies for the best presentation of our site. Continuing to use this site, you agree with this.