HardBreak
GitHubDiscordLinkedInX
  • HardBreak - Hardware Hacking Wiki
  • Introduction
    • How to start
    • Methodology
    • Case Study (Led to a CVE Update)
      • General Case Study
  • Hardware Hacking
    • Introduction
    • Basics
      • Tools
        • Hardware Tools
          • Essential Tools
          • Soldering Tools
          • Logic Analyzer
            • Saleae Logic Analyzer
          • Open-Source Tools
            • Bus Pirate v3.6
            • Bus Pirate 5
            • GoodFET
          • Multimeters & Oscilloscopes
          • JTAG and SWD Debuggers
            • Segger JLink
            • TI CC-Debugger
          • UART-to-TTL adapter
          • Chip readers and programmers
            • Xgecu T56
        • Software Tools
          • Binwalk
          • Firmwalker
          • flashrom
          • Ghidra
          • OpenOCD
          • Mitmrouter
      • Common Hardware Components
      • Firmware Extraction Methods
      • Ethics
    • Reconnaissance
      • Closed device
        • OSINT (search the web)
        • USB Ports / SD-card
      • Opened device
        • Board Analysis
    • Interface Interaction
      • UART
        • Identify UART
        • Connect to UART
        • Extract Firmware using UART
      • I2C
      • SPI
        • Extract Firmware using SPI
      • JTAG/SWD
        • JTAG
          • Identify JTAG
        • SWD
        • Extract Firmware using JTAG/SWD
      • VE.Direct
    • Bypassing Security
      • Voltage Glitching
        • Example: LPC1768
      • Electromagnetic Fault Injection
    • Analyze Firmware
  • Network Analysis
    • Introduction
    • Reconnaissance
    • Protocols
      • WIFI
        • WEP
        • Deauthentication Attacks
      • Application Layer
        • Proprietary Protocols
          • Parrot Anafi Drone Reverse Engineering
        • MQTT
        • CoAP
        • Web Sockets
  • Radio Hacking
    • Introduction
    • Reconnaissance
    • Protocols
      • NFC
      • RFID
    • Tools
      • RF Signal Analyzers
        • RTL-SDR
        • HackRF
      • Flipper Zero
        • NFC
        • Sub-GHz
  • Contribute
    • How to contribute
    • Gitbook - Basics
      • Markdown
      • Images & media
      • Interactive blocks
  • About
    • Impressum – Legal Notice
    • Privacy Policy
    • Datenschutzerklärung
    • License
Powered by GitBook
On this page
  • Theory
  • Requirements
  • Attacks
  • Resources:

Was this helpful?

Edit on GitHub
  1. Network Analysis
  2. Protocols
  3. WIFI

WEP

Theory

WEP is a security protocol designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usually expected of a wired LAN. Although WEP was designed to ensure that only authorized users can access the wireless network and to encrypt data transmissions, it has several vulnerabilities that make it ineffective for securing wireless networks today.

Vulnerabilities:

  • Encryption: WEP uses the RC4 stream cipher for encryption, with a fixed key length of 40 bits or 104 bits.

  • Integrity Check: WEP includes a cyclic redundancy check (CRC) for data integrity, but it does not provide strong authentication or key management.

  • Weak encryption keys: The small key size (40 or 104 bits) and reuse of keys make it vulnerable to attacks.

  • IV (Initialization Vector) reuse: The IV used in WEP is not random enough, leading to predictable patterns that can be exploited.

Requirements

  • Wireless Network Card: A card that supports monitor mode (e.g., Atheros, Ralink).

  • Linux OS: Kali Linux is commonly used for penetration testing.

  • Tools:

    • Aircrack-ng suite

    • Reaver

    • Wifite

Attacks

1. Packet Sniffing

Description: Capturing wireless packets transmitted over the WEP-encrypted network.

Command Example:

airodump-ng wlan0

Replace wlan0 with your network interface in monitor mode.

2. IV Injection Attack

Description: Exploiting the predictable nature of the IVs used in WEP, allowing attackers to inject packets into the network.

Command Example:

aireplay-ng --arpreplay -b [Target_BSSID] -h [Your_MAC_Address] wlan0

Replace [Target_BSSID] with the target network's BSSID and [Your_MAC_Address] with your own MAC address.

3. WEP Key Cracking

Description: Capturing enough packets to recover the WEP key used for encryption.

Command Example:

aircrack-ng -b [Target_BSSID] [Capture_File].cap

Replace [Capture_File].cap with the file containing the captured packets.

4. WEP Deauthentication Attack

Description: Forcing a client to disconnect from the network, which allows the attacker to capture the handshake process and collect more IVs.

Command Example:

aireplay-ng --deauth 10 -a [Target_BSSID] wlan0

Replace 10 with the number of deauthentication packets to send.

Resources:

PreviousWIFINextDeauthentication Attacks

Last updated 4 months ago

Was this helpful?

Aircrack-ng
Wi-Fi Hacking Series- Exploring WEP Attacks (Part-2)