fifothekid asked:

This attack can be used on a network that has at least one active client This video is based on: forums.remote-exploit.org

Advertisement
Tagged with →  
Share →

7 Responses to Backtrack Series – 1: Cracking WEP Protection Using Deauthentication and ARP Packets Injection

  1. TheSuperFridge says:

    Excellent, currently making my own program to do this on.

  2. mafralucas says:

    nice tutorial man helped me out alot! thanks 4 th1s

  3. ReceivedFiles says:

    Dude, can you add voice or bigger text please.

  4. ross817 says:

    Nevermind, I followed the link in the description, and all my questions were answered. Thanks for making the video!

  5. ross817 says:

    So, what’s the difference between a BSSID, and a client?
    They both look like MAC addresses to me, but why would a router have two MAC addresses?

    Also, how did you find the address you entered for client? You did it a little too fast for me to see.

  6. fifothekid says:

    It’s a matter of trial and error
    collect a maiximum of 50,00
    Try 64 bit
    If it doesn’t work, try 128 bit
    If it doesn’t work, then there’s a program that filters the fake IVs from the capture files, I don’t remember it’s name now

  7. impiwimpi says:

    How can you find the bit-strength of the key?
    I know they are supposed to be 64,128,..
    But is there a way to find this?

Leave a Reply

Your email address will not be published. Required fields are marked *

Looking for something?

Use the form below to search the site:


Still not finding what you're looking for? Drop us a note so we can take care of it!

Set your Twitter account name in your settings to use the TwitterBar Section.