WEP cracking using Gerix Wifi Cracker in BackTrack

GerixWiFiCracker is GUI for Aircrack-ng suite, is designed for pentesting in a realworld with efficent and userfriendly graphic interface.

Get Gerix WIFI Cracker:

apt-get update
apt-get install gerix-wifi-cracker

You can use the program for various types of attack on wifi networks:

– Cracking WEP (chop-chop, fragmentation)
– Cracking WPA (based on wordlist or rainbow tables)
– Client-side attacks
– Creating fake access-point

> Open BackTrack 5 R3.

> Go to Applications > BackTrack > Exploitation Tools > Wireless Exploitation Tools > WLAN Exploitation > gerix-wifi-cracker-ng.

> Open Configuration tab.

> Select interface from the list and click Enable/Disable Monitor Mode button.

> You can set a random mac address by selecting an interface and clicking button Set random MAC address.

> When you are ready, click Rescan networks button to get a list of all available wireless networks for all channels.

> Select a WEP wireless network.

> Open WEP tab.

> Click Start Sniffing and Logging.

> Open WEP Attacks (no-client).

> Click button Start false access point Authentication on victim.

> Click the Start the ChopChop attack.

> On the new window that pops up when a suitable packet has been found type y to answer the question: Use this packet ?

> When it’s done, click button Create the ARP packet to be injected on the victim access point.

> You’ll see an appropriate message in the logs at the bottom that says: ARP packet created.

> And now click Inject the created packet on victim access point.

> On the new window that pops up when a suitable packet has been found type y to answer the question: Use this packet ?

> After having collected a few packages (at least 200000 packets) cancel and close opened terminal windows.

> Open Cracking tab in Gerix.

> Click button, Aircrack-ng – Decrypt WEP password.

 

 

%d bloggers like this: