ad

Hacker-Rock

Welcome to My Blog

Crack WEP wifi password using back track

You already know that if you want to lock down your Wi-Fi network, you should opt for WPA encryption because WEP is easy to crack. But did you know how easy? Take a look.
Note: This post demonstrates how to crack WEP passwords, an older and less often used network security protocol. If the network you want to crack is using the more popular WPA encryption, see our guide to cracking a Wi-Fi network's WPA password with Reaver instead.
Today we're going to run down, step-by-step, how to crack a Wi-Fi network with WEP security turned on. But first, a word: Knowledge is power, but power doesn't mean you should be a jerk, or do anything illegal. Knowing how to pick a lock doesn't make you a thief. Consider this post educational, or a proof-of-concept intellectual exercise.
Dozens of tutorials on how to crack WEP are already all over the internet using this method. Seriously—Google it. This ain't what you'd call "news." But what is surprising is that someone like me, with minimal networking experience, can get this done with free software and a cheap Wi-Fi adapter. Here's how it goes.

What You'll Need

Unless you're a computer security and networking ninja, chances are you don't have all the tools on hand to get this job done. Here's what you'll need:

  • A compatible wireless adapter—This is the biggest requirement. You'll need a wireless adapter that's capable of packet injection, and chances are the one in your computer is not. After consulting with my friendly neighborhood security expert, I purchased an Alfa AWUS050NH USB adapter, pictured here, and it set me back about $50 on Amazon.Update: Don't do what I did. Get the Alfa AWUS036H, not the US050NH, instead. The guy in this video below is using a $12 model he bought on Ebay (and is even selling his router of choice). There are plenty of resources on getting aircrack-compatible adapters out there.
  • A BackTrack Live CD. We already took you on a full screenshot tour of how to install and use BackTrack 3, the Linux Live CD that lets you do all sorts of security testing and tasks. Download yourself a copy of the CD and burn it, or load it up in VMware to get started.
  • A nearby WEP-enabled Wi-Fi network. The signal should be strong and ideally people are using it, connecting and disconnecting their devices from it. The more use it gets while you collect the data you need to run your crack, the better your chances of success.
  • Patience with the command line. This is an ten-step process that requires typing in long, arcane commands and waiting around for your Wi-Fi card to collect data in order to crack the password. Like the doctor said to the short person, be a little patient.
  • To crack WEP, you'll need to launch Konsole, BackTrack's built-in command line. It's right there on the taskbar in the lower left corner, second button to the right. Now, the commands.
    First run the following to get a list of your network interfaces:
    airmon-ng
    The only one I've got there is labeled ra0. Yours may be different; take note of the label and write it down. From here on in, substitute it in everywhere a command includes (interface).
    Now, run the following four commands. See the output that I got for them in the screenshot below.
    airmon-ng stop (interface)<br>ifconfig (interface) down<br>macchanger --mac 00:11:22:33:44:55 (interface)<br>airmon-ng start (interface)
    How to Crack a Wi-Fi Network's WEP Password with BackTrack
    If you don't get the same results from these commands as pictured here, most likely your network adapter won't work with this particular crack. If you do, you've successfully "faked" a new MAC address on your network interface, 00:11:22:33:44:55.
    Now it's time to pick your network. Run:
    airodump-ng (interface)
    To see a list of wireless networks around you. When you see the one you want, hit Ctrl+C to stop the list. Highlight the row pertaining to the network of interest, and take note of two things: its BSSID and its channel (in the column labeled CH), as pictured below. Obviously the network you want to crack should have WEP encryption (in the ENC) column, not WPA or anything else.
    How to Crack a Wi-Fi Network's WEP Password with BackTrack
    Like I said, hit Ctrl+C to stop this listing. (I had to do this once or twice to find the network I was looking for.) Once you've got it, highlight the BSSID and copy it to your clipboard for reuse in the upcoming commands.
    Now we're going to watch what's going on with that network you chose and capture that information to a file. Run:
    airodump-ng -c (channel) -w (file name) --bssid (bssid) (interface)
    Where (channel) is your network's channel, and (bssid) is the BSSID you just copied to clipboard. You can use the Shift+Insert key combination to paste it into the command. Enter anything descriptive for (file name). I chose "yoyo," which is the network's name I'm cracking.
    How to Crack a Wi-Fi Network's WEP Password with BackTrack
    You'll get output like what's in the window in the background pictured below. Leave that one be. Open a new Konsole window in the foreground, and enter this command:
    aireplay-ng -1 0 -a (bssid) -h 00:11:22:33:44:55 -e (essid) (interface)
    Here the ESSID is the access point's SSID name, which in my case is yoyo. What you want to get after this command is the reassuring "Association successful" message with that smiley face.
    How to Crack a Wi-Fi Network's WEP Password with BackTrack
    You're almost there. Now it's time for:
    aireplay-ng -3 -b (bssid) -h 00:11:22:33:44:55 (interface)
    Here we're creating router traffic to capture more throughput faster to speed up our crack. After a few minutes, that front window will start going crazy with read/write packets. (Also, I was unable to surf the web with the yoyo network on a separate computer while this was going on.) Here's the part where you might have to grab yourself a cup of coffee or take a walk. Basically you want to wait until enough data has been collected to run your crack. Watch the number in the "#Data" column—you want it to go above 10,000. (Pictured below it's only at 854.)
    Depending on the power of your network (mine is inexplicably low at -32 in that screenshot, even though the yoyo AP was in the same room as my adapter), this process could take some time. Wait until that #Data goes over 10k, though—because the crack won't work if it doesn't. In fact, you may need more than 10k, though that seems to be a working threshold for many.
    How to Crack a Wi-Fi Network's WEP Password with BackTrack
    Once you've collected enough data, it's the moment of truth. Launch a third Konsole window and run the following to crack that data you've collected:
    aircrack-ng -b (bssid) (file name-01.cap)
    Here the filename should be whatever you entered above for (file name). You can browse to your Home directory to see it; it's the one with .cap as the extension.
    If you didn't get enough data, aircrack will fail and tell you to try again with more. If it succeeds, it will look like this:
    How to Crack a Wi-Fi Network's WEP Password with BackTrack
    The WEP key appears next to "KEY FOUND." Drop the colons and enter it to log onto the network.

    Problems Along the Way

    With this article I set out to prove that cracking WEP is a relatively "easy" process for someone determined and willing to get the hardware and software going. I still think that's true, but unlike the guy in the video below, I had several difficulties along the way. In fact, you'll notice that the last screenshot up there doesn't look like the others—it's because it's not mine. Even though the AP which I was cracking was my own and in the same room as my Alfa, the power reading on the signal was always around -30, and so the data collection was very slow, and BackTrack would consistently crash before it was complete. After about half a dozen attempts (and trying BackTrack on both my Mac and PC, as a live CD and a virtual machine), I still haven't captured enough data for aircrack to decrypt the key.
    So while this process is easy in theory, your mileage may vary depending on your hardware, proximity to the AP point, and the way the planets are aligned. Oh yeah, and if you're on deadline—Murphy's Law almost guarantees it won't work if you're on deadline.

Installing Backtrack Live CD

BackTrack is a Security-Focused Live CD Packed With System Tools
BackTrack was the winner of our recent Hive Five for best Live CD, so we decided to take it for a test drive and show off a few of the features for everybody else.
BackTrack can be installed to a regular boot cd, a USB drive, installed to the hard drive, or even downloaded as a VMware virtual machine. For our testing, we used the BackTrack 3 stable release instead of the Beta 4 version since most commenters directly mentioned version 3 in the original call for contenders.
After inserting the LiveCD and starting the boot process, you'll be prompted to choose which window environment to load up—the distribution includes the more graphically pleasing KDE, or the trimmed-down Fluxbox window manager.
BackTrack is a Security-Focused Live CD Packed With System Tools
Once you've booted to the desktop you'll notice the default resolution is 800x600, but can be easily changed through the system tray icon to any resolution.








BackTrack is a Security-Focused Live CD Packed With System Tools
The slick system monitoring application on the right-hand side of the first screenshot doesn't get started automatically—to open it, you'll need to use the Alt+F2 shortcut key and type leetmode into the command window. You can unlock the position of the monitors through the context menu, and drag them wherever on the screen you'd like.











BackTrack is a Security-Focused Live CD Packed With System Tools
One of the more interesting features in the Live CD is the inclusion of the excellent andpreviously mentioned Yakuake drop-down terminal window, which can be launched through the Alt+F2 dialog, or found under the System menu. Once started, simply use the F12 key to toggle the slide-down terminal.


BackTrack is a Security-Focused Live CD Packed With System Tools
Connecting to any network resource can be done easily with the Network Folder Wizard, found in the menus at Internet -> KNetAttach. You can easily map to a Windows share, SSH, or FTP server using the wizard—which is nothing more than an easy front-end to the Konqueror browser's rich connection support.
BackTrack is a Security-Focused Live CD Packed With System Tools
Since this distribution is focused on security, you can find a ton of security-focused tools under the Backtrack menu, although there are far too many to mention every one of them here—you'll have to explore them on your own.
BackTrack is a Security-Focused Live CD Packed With System Tools

One of the more useful security tools for everyday use is the chntpw utility (found in the menus under Privilege Escalation -> PasswordAttacks) that can reset any Windows password easily from the command line. For more on this command, I've previously written an article aboutchanging your forgotten Windows password.
BackTrack is a Security-Focused Live CD Packed With System Tools
BackTrack 3 is a free download, works almost anywhere Linux does. Be sure to check out the original Hive Five for the rest of the Live CD choices from your fellow Lifehacker readers, or learn how to rescue files with Knoppix.

Formatting USB using Command Prompt



Formatting an USB flash drive from the command prompt is really easy. This procedure can be achieved using the format command, which works for most version of Microsoft Windows (Windows 95 up to Windows 8.1).

The procedure is as follows:
Connect the USB flash drive to your PC.
Click on Start > Run > Type cmd and click on OK.
Assuming the letter assigned to the USB flash drive is G, type the following command:
format /q /x G: and press Enter.
The q parameter stands for quick format
The x parameter forces the selected volume to dismount, if needed.
NB: Don't forget to replace the letter "G" with your drive letter.

Avg antivirus Serial key

8MEH-R2CML-SS7FW-MOXFR-TVC9T-3EMBR-ACED
8MEH-RFR8J-PTS8Q-92ATA-O4WHO-JEMBR-ACED
8MEH-RPDWL-THRLY-O8Z3R-4H3OA-4EMBR-ACED
8MEH-RCB97-4HRT9-P4RRR-RRFOP-2EMBR-ACED
8MEH-RW2ZU-29S4F-26QCR-WFZV4-BEMBR-ACED
8MEH-RREY3-L2LQA-LUMOR-UHNK2-6EMBR-ACED
8MEH-RPDWL-THRLY-O8Z3R-474SC-4EMBR-ACED
8MEH-RPTGT-KMOL7-EEEVR-KORKD-LEMBR-ACED
8MEH-RMXLW-HN44A-BABPA-SBK3B-PEMBR-ACED
8MEH-RCKOP-BP9KK-YW8EA-6K8TK-SEMBR-ACED
8MEH-RFR8J-PTS8Q-92ATA-OTV8K-JEMBR-ACED
8MEH-RCKOP-BP9KK-YW8EA-6XSTN-SEMBR-ACED
8MEH-RNZLL-2Y4QX-79PPA-MRVQG-AEMBR-ACED
8MEH-R6633-YP39H-YCNSR-HCPKV-EEMBR-ACED
8MEH-RGHD3-SUKUO-SXPWA-PWQVP-9EMBR-ACED
8MEH-RGHD3-SUKUO-SXPWA-PDNML-9EMBR-ACED
8MEH-R3VBQ-DC433-3FPOA-YOQFR-NEMBR-ACED
8MEH-RB32G-UP98U-TRLQR-BKQQO-CEMBR-ACED
8MEH-RU7JQ-ACDRM-MQEPR-GHSH8-FEMBR-ACED
8MEH-RF3MY-BZ7CJ-9LUAR-SG97J-CEMBR-ACED
8MEH-RS47Y-82HT8-GONVA-BQGH3-DEMBR-ACED
8MEH-RGM33-K474L-6FGRR-8DOQK-UEMBR-ACED
8MEH-RGM33-K474L-6FGRR-899MQ-UEMBR-ACED
8MEH-RF3MY-BZ7CJ-9LUAR-SDNYQ-CEMBR-ACED
8MEH-RYH2W-SAT6N-H2HGA-WPNL4-9EMBR-ACED
8MEH-RLKZO-8CQHH-HSYKA-KGQ7A-SEMBR-ACED
8MEH-RF3MY-BZ7CJ-9LUAR-SJG6J-CEMBR-ACED
8MEH-R2CML-SS7FW-MOXFR-TXSKS-3EMBR-ACED
8MEH-RCKOP-BP9KK-YW8EA-6V6VM-SEMBR-ACED

android tricks

1. Phone Information, Usage andBattery – *#*#4636#*#*

2. IMEI Number – *#06#

3. Enter Service Menu On NewerPhones – *#0*#

4. Detailed Camera Information –*#*#34971539#*#*

5. Backup All Media Files –*#*#273282*255*663282*#*#*

6. Wireless LAN Test –*#*#232339#*#*

7. Enable Test Mode for Service –*#*#197328640#*#*

8. Back-light Test – *#*#0842#*#*

9. Test the Touchscreen –*#*#2664#*#*

10. Vibration Test – *#*#0842#*#*

11. FTA Software Version –*#*#1111#*#*

12. Complete Software andHardware Info – *#12580*369#

13. Diagnostic Configuration –*#9090#

14. USB Logging Control –*#872564#

15. System Dump Mode – *#9900#

16. HSDPA/HSUPA Control Menu –*#301279#

17. View Phone Lock Status –*#7465625#

18. Reset the Data Partition toFactory State – *#*#7780#*#*