Lab Crack Wep

In: Computers and Technology

Submitted By cmiltonenrique
Words 1215
Pages 5
LABORATORIO

12
CRACKEANDO WEP/WPA CON KALI-LINUX
OBJETIVOS
Aircrack-ng es un programa cracking de claves WEP y WPA-PSK 802.11 que recupera las claves una vez que los suficientes paquetes de datos han sido capturados. Implementa el ataque estándar FMS junto con algunas optimizaciones como ataques KoreK, así como el ataque totalmente nuevo PTW, que hace el ataque mucho más rápido en comparación con otras herramientas de cracking.
AMBIENTE DE LABORATORIO
Para llevar a cabo este laboratorio necesitas:
 Un computador virtual que ejecute Windows 7
 Un computador virtual que ejecute Kali Linux 1.04 o superior
VISIÓN GENERAL
Como un Profesional en Sistemas Operativos de una organización, tu director IT te asignará una tarea testear la seguridad Wireless, explotar el flujo en WEP, y crackear las claves presentes en WEP de una organización..
OBJETIVOS DEL LABORATORIO
El objetivo de este laboratorio es proteger la red inalámbrica de los atacantes. En este laboratorio aprenderás como:
 Crackear WEP / WPA usando diferentes herramientas
 Capturar tráfico de red.
 Analizar y detectar tráfico inalámbrico.
AMBIENTE DEL LABORATORIO
Para ejecutar este laboratorio, tú necesitas:
KALI-LINUX
KALI-LINUX aircrack-ng y otras herramientas.
DURACION DEL LABORATORIO: Tiempo 45 MINUTOS
VISION GENERAL DE Aircrack-ng
Las redes Wireless se refieren a algún tipo de red de computadoras que es inalámbrico y es generalmente asociado con una red de telecomunicaciones cuya interconexiones entre nodos son implementados sin el uso de cables. Las redes de telecomunicaciones inalámbricas son generalmente implementadas con algún tipo de sistema de transmisión de información remoto que usa ondas electromagnéticas, tales como ondas de radio, para el carrier y esta implementación usualmente toma lugar en el nivel físico o capa de la red.

pmchinch@cibertec.edu.pe…...

Similar Documents

Wep Cracking Steps

...Basic steps to get you cracking WEP (for scriptkiddies) Once you got your tools ready it is time to get cracking. Routers especially those given out by our local ISP have their default security settings set to WEP to encrypt their traffic. This can be easily cracked by aircrack-ng suite in about 5 min once you are “au fait” with the setup. For those who want to jump straight into the cracking process here are the basic steps you need to take. Step 0: Spoof MAC address Open terminal and run the command: sudo ifconfig < attacker’s wlan interface > hw ether Step 1: Gather essential background data about yourself and your target. target_router SSID -> target_router target_router MAC address -> 00:14:7F:99:EB:99 target router channel-> 6 attacker’s MAC address -> 00:0f:b5:ff:ff:f9 attacker’s wlan interface: wlan0 attacker’s monitoring interface name (spawned from wlan0): mon0 Note: Replace the above variables with your own. These were mine for my setup. Step 2: Using aircrack-ng suite to crack WEP. sudo airmon-ng start wlan0 -> spawn a monitoring interface from wlan0. sudo airodump-ng mon0 -> survey / scan for your target router. sudo airmon-ng stop mon0 -> stop the monitoring interface so that you can start it again to listen on channel 6. sudo airmon-ng start wlan0 6 -> This starts the mon0 interface listening to only channel 6 [Important step!]. sudo airodump-ng -c6 -w outputfile mon0 -> pump output to a file called......

Words: 363 - Pages: 2

The Difference Between Cracking a Wep and a Wpa Network Passkey and How to Protect Yourself from It

...networking, and my goal is to inform you of those vulnerabilities to help you stay protected from them. Wired Equivalent Protocol (WEP) was the original wireless security protocol. WEP was flawed in numerous ways and hackers were able to get information in minutes. WPAv1 was then introduced as an interim replacement because WEP was that flawed. WPAv1 was made to improve on the secure wireless networks and also used a newer and more improved algorithm. When WPAv2 was finally released, many devices began to be created to be compatible with the AES algorithm WPAv2 uses. There still have not been any major hacks or attacks on a WPAv2-AES network that would cause the Wi-Fi alliance look into using another algorithm a replacement. WPAv1 is too easy to hack so it is not recommended and WPAv1 is now susceptible to multiple types of attacks. There are several different ways you can help to protect yourself and your information. Verify your spam in your e-mail to make sure a file accidentally was not forwarded to spam. There are also others to improve your security. The length of your passkey is very important in security, as well as keeping an up-to-date anti-virus and staying up-to-date on all the latest hacks, cracks, and technology are critical for your protection. N. Justin Bernard Network Security Term Paper November 13, 2012 The difference between cracking a WEP and a WPA network passkey and how to protect yourself from it In today’s always evolving and improving......

Words: 3607 - Pages: 15

Crack the Whip

...Crack the whip Recently I don't know if it's just me or not, but I've noticed that everywhere I go there happens to be a child that is throwing a fit, crying or even scream at their parents. Generally it seems to be the subject they're not getting what they want that day at that moment. And it doesn't bother me that it's happening, the thing that bothers me is that parents give in to their child's or children's demand and walks them back into Walmart, Toys R Us, Target or whatever store that I happen to be at that day and them whatever it is that they want. It's kind of sad to see that today's kids lack discipline and that parents don't do anything about it beside turn. Kids today are spoiled and parents are not doing what is necessary to fix. As I said last kids are spoiled, at least kinds where I live are spoiled. I believe it starts with the parents. Parents who don't feel like standing their ground because their kids happen to throw a tantrum, cry, and complain at them. Parents have become pushovers and cave in at the signs that their children might become upset or cause a scene. The parents have I believe gotten lazy when it comes to keeping their kids in line or so self-absorb they care more about their image and how their children are acting. Parent who believe that they can buy their children's affection by giving them everything they want. Are just as bad those parents are just trying to fill a void that they have made with material items saying yes to everything...

Words: 923 - Pages: 4

Lab Four

...Lab #4 – Assessment Worksheet Implement Organizational-Wide Network and WLAN Access Controls Lab 4 Assessment Questions & Answers 1. What risk exposure are you subjecting your Microsoft Windows systems to by opening up ports on your internal firewall? Buy opening ports in your firewall it is allowing people access to you network and if anybody that trys to get in figures out the port they can potentially gain access to your system. 2. Using the VM’s on your student workstation, how can you test if your Windows internal firewall is configured properly? By going to start -> control Panel -> Select firewall there it gives you the options that are on Windows Firewall. 3. Name at least three significant risks of logging in to access points in airports, hotels and other public places. Explain. E-commerce involves the passing of sensitive information, like credit card numbers or bank account numbers, over the Internet, and the risk of losing the privacy of this information is high in public places. Theft of unencrypted wireless data can easily occur in public areas because WiFi hotspots do not provide encryption, such as WEP, WPA, or WPA2, in order to simplify the connection process and minimize the management workload. Evil twin hotspot: These are hot spots set up by a hacker and made available to the public. Unknowing users who connect to the Internet using these access points are then exposing their sensitive information to the hacker...

Words: 639 - Pages: 3

Lab Four

...Lab #4 – Assessment Worksheet Implement Organizational-Wide Network and WLAN Access Controls Lab 4 Assessment Questions & Answers 1. What risk exposure are you subjecting your Microsoft Windows systems to by opening up ports on your internal firewall? Buy opening ports in your firewall it is allowing people access to you network and if anybody that trys to get in figures out the port they can potentially gain access to your system. 2. Using the VM’s on your student workstation, how can you test if your Windows internal firewall is configured properly? By going to start -> control Panel -> Select firewall there it gives you the options that are on Windows Firewall. 3. Name at least three significant risks of logging in to access points in airports, hotels and other public places. Explain. E-commerce involves the passing of sensitive information, like credit card numbers or bank account numbers, over the Internet, and the risk of losing the privacy of this information is high in public places. Theft of unencrypted wireless data can easily occur in public areas because WiFi hotspots do not provide encryption, such as WEP, WPA, or WPA2, in order to simplify the connection process and minimize the management workload. Evil twin hotspot: These are hot spots set up by a hacker and made available to the public. Unknowing users who connect to the Internet using these access points are then exposing their sensitive information to the hacker...

Words: 639 - Pages: 3

Lab Four

...Lab #4 – Assessment Worksheet Implement Organizational-Wide Network and WLAN Access Controls Lab 4 Assessment Questions & Answers 1. What risk exposure are you subjecting your Microsoft Windows systems to by opening up ports on your internal firewall? Buy opening ports in your firewall it is allowing people access to you network and if anybody that trys to get in figures out the port they can potentially gain access to your system. 2. Using the VM’s on your student workstation, how can you test if your Windows internal firewall is configured properly? By going to start -> control Panel -> Select firewall there it gives you the options that are on Windows Firewall. 3. Name at least three significant risks of logging in to access points in airports, hotels and other public places. Explain. E-commerce involves the passing of sensitive information, like credit card numbers or bank account numbers, over the Internet, and the risk of losing the privacy of this information is high in public places. Theft of unencrypted wireless data can easily occur in public areas because WiFi hotspots do not provide encryption, such as WEP, WPA, or WPA2, in order to simplify the connection process and minimize the management workload. Evil twin hotspot: These are hot spots set up by a hacker and made available to the public. Unknowing users who connect to the Internet using these access points are then exposing their sensitive information to the hacker...

Words: 639 - Pages: 3

Crack Cocaine & Mass Incarceration

...The American Crack Epidemic: How the War on Drugs was as Detrimental to Society as Drugs Themselves. Lucas Carneiro U.S. History 4/21/2013 Throughout the mid-20th century, Americans have experimented with illicit drugs, from marijuana to LSD. In the late 70s and early 80s, the high cost of cocaine made it the drug of choice for wealthy, elite, White Americans. On the other side of the social spectrum, lower-class African Americans sought an escape from their difficult circumstances in impoverished inner-city neighborhoods. They found refuge in crack, a smokeable form of cocaine, whose low production cost, high addictiveness, and debilitating nature made it the drug of choice for urban African American communities in 1986 (Reinarman, 1997; Watkins, 1998; Fullilove, 1998). The drug contributed to the increase in disease, violence, and poverty in these communities, turning inner-city neighborhoods into “war zones”. The U.S. Government’s War on Drugs campaign did little to solve this crisis, using aggressive, military tactics to address an epidemic surrounded by socioeconomic and health issues. In the 1960s, the Vietnam conflict among several unpopular moves by the U.S. government created a generation of rebellious, young Americans. This generation experimented with drugs in order to alter their state of mind, and to escape from the problems that came with politics and society. The generation of young “hippies” ignited a drug culture in the U.S. As time progressed,......

Words: 2189 - Pages: 9

A Crack in the Mug, Can Starbucks Mend It?

...A crack in the mug, can Starbucks mend it? In January 2008 Starbucks announced the closer of 100 US stores, but that number grew to 600 by July of 2008. After 20 years of remarkable growth, the last six months of 2007 saw Starbucks shaken by a decline in share price of 50 per cent and a reduction in customer visits to its outlets in North America. Its share price declined from $19 to $18.00 by mid-2008. The company’s brand image took a major hit with a $0.09 cent increase per cup and several similar increases in price over the past four years. All of this has led to disapproval from their shareholders. To increase favor with their shareholders, Starbucks will need to do a combination of tactics .They need to increase their sales quite a bit in order to suppress the shareholders fears. As long as consumers buy, the shareholders will buy stock, and feel comfortable with keeping it. To get consumers to consume more, they need to offer more of their products. They could possibly start offering products that they currently do not offer but use in making their products. For example they could start selling the accessory items like spices, syrups, sprinkles and the rest of the things that makes Starbucks so great. These are items that already have a great demand with preexisting Starbucks customers since they are used with all of their most popular items. Also, since Starbucks has no complete advantage over their major competitors like McDonalds and Dunkin Donut, one thing they......

Words: 408 - Pages: 2

Lab 4

...Willie Harris ------------------------------------------------- is3230 lab 4.2 Implement Organizational-Wide Network and WLAN Access Controls 1. Each time you open a port or allow a program to communicate through a firewall, your computer becomes a bit less secure. The more allowed programs or open ports your firewall has, the more opportunities there are for hackers or malicious software to use one of those openings to spread a worm, access your files, or use your computer to spread malicious software to othersEach time you open a port or allow a program to communicate through a firewall, your computer becomes a bit less secure. The more allowed programs or open ports your firewall has, the more opportunities there are for hackers or malicious software to use one of those openings to spread a worm, access your files, or use your computer to spread malicious software to others. 2. 2. By going to start -> control Panel -> Select firewall there it gives you the options that are on Windows Firewall. 3. First if you’re sitting in a coffee shop and decide you want to check your Facebook page and your email to kill some time. You scan the available networks and see one that’s open and unsecured. You connect and start surfing. Coffee and free WiFi, what could be better, right? Wrong! A hacker is also fond of coffee shops and he is located within range of the router you connected to. He’s waiting for one or more people to connect to the network so he can start......

Words: 628 - Pages: 3

Crack Your Interview

...phone a couple of weeks later, I struggled with what to tell him Be smarter? No, I knew he was brilliant Be a better coder? No, his skills were on-par with some of the best I'd seen Like many motivated candidates, he had prepared extensively He had read K&R’s classic C book and he'd reviewed CLRS' famous algorithms textbook He could describe in detail the myriad of ways of balancing a tree, and he could do things in C that no sane programmer should ever want to do I had to tell him the unfortunate truth: those books aren’t enough Academic books prepare you for fancy research, but they’re not going to help you much in an interview Why? I'll give you a hint: your interviewers haven’t seen Red-Black Trees since they were in school either To crack the coding interview, you need to prepare with real interview questions You must practice on real problems, and learn their patterns Cracking the Coding Interview is the result of my first-hand experience interviewing at top companies It is the result of hundreds of conversations with candidates It is the result of the thousands of candidate- and interviewer- contributed questions And it’s the result of seeing so many interview questions from so many firms Enclosed in this book are 150 of the best interview questions, selected from thousands of potential problems 5 Cracking the Coding Interview Introduction My Approach The focus of Cracking the Coding Interview is algorithm, coding and design questions Why? Because while you......

Words: 47808 - Pages: 192

Labs

...© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones Bartlett Lab #2© Jones &SALE ORLearning, LLC Vulnerabilities to &SALE ORLearning, LL AligningBartlett DISTRIBUTION Risks, Threats, and NOT FOR DISTRIBUT NOT FOR COBIT P09 Risk Management Controls © Jones & Bartlett Learning, LLC Introduction © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION NOT FOR SALE OR DISTRIBUTION Ask any IT manager about the challenges in conveying IT risks in terms of business risks, or about translating business goals into IT goals. It’s a common difficulty, as the worlds of business and IT do not inherently align. This lack of alignment was unresolved until ISACA developed a framework called COBIT, © Jones & Bartlett Learning, LLC first released in 1996.Jones & Bartlett Learning, LLC © ISACA is an IT professionals’ association centered on auditing and IT governance. This NOT FOR SALE OR DISTRIBUTION The lab lab will focus on the COBIT framework. NOT FOR SALE OR DISTRIBUTION uses the latest two versions: COBIT 4.1, which is currently the most implemented version, and COBIT 5, which is the latest version released in June 2012. Because COBIT 4.1 is freely available at the time of this writing, the lab uses this version to © Jones & Bartlett Presentation is done making use of a © Jones & Bartlett Learning, LL present handling of risk management. Learning, LLC set of COBIT......

Words: 2487 - Pages: 10

Safety in the Lab

...extinguishers, phones, showers, etc. The safety equipments available to me while doing the experiments are safety gear, such as gloves, goggles, and protective clothing. Also, equipments such as extinguishers, fire blankets, shower and eye washes are important to have and should be located around and near you for quick use. 2. What is an MSDS? An MSDS is a material safety data sheet where it contains the chemical’s or item’s physical or chemical characteristics. It also lists the information about health and safety about the usage of the product. 3. What can make glassware unuseble? Glassware become unusable when it has cracks on them because they become dangerous when experimenting anything especially using them with heating. 4. When should you wear goggles in the lab? You should wear goggles when doing lab at all times to prevent any injury or damage. 5. How long should you wash your eyes if you get a chemical in them? You should wash your eyes for at least fifteen minutes immediately after coming contact with chemicals. 6. What should you do if your clothing catches on fire? When your clothes get on fire, you should immediately go to the safety shower. If there is none, you should attempt the stop-drop-roll-yell technique or get the fire blanket as soon as possible. Also, yell for help when needed. 7. How should you heat the liquid in a test tube to a temperature less than 100 (C? When heating the liquid in a......

Words: 524 - Pages: 3

Lab 7

...Laboratory 7: Security Basics December 1, 2014 Lab 7: Security Basics Task 1: Procedure 1. Firewalls may be hardware devices or software programs. Hardware firewalls protect an entire network. Software firewalls protect a single computer. Locate an example of each of these types of firewalls and compare their features. Linksys and Cisco make firewall/routers for home use. The Zonelabs Zone-Alarm firewall is an example of a software firewall. a. Cisco RV082 Dual WAN VPN Router i. Dual Fast Ethernet WAN ports for load balancing and/or business continuity ii. Built-in 8-port Fast Ethernet switch iii. Strong security iv. High capacity VPN capabilities v. Optional cloud-based web security service vi. Support for Small Business QuickVPN software b. Linksys WRT54GS Wireless i. G Broadband Router with SpeedBooster IEEE 802.3/3u, IEEE 802.11b/g ii. VPN Pass Through iii. Stateful Packet Inspection (SPI) Firewall, Internet Policy Wi-Fi Protected Access 2 (WPA2), WEP, Wireless MAC Filtering Task 2: Procedure 1. By 2010 the number of different known viruses numbered over 4 million. Many companies produce anti-virus programs to help protect your computer against these threats. Some of the companies are Panda, Norton, McAfee, AVG, and Kaspersky. Which of these companies provide free versions of their software? Which ones provide trial versions? a. Free versions i. AVG b. Trial versions i. Panda ii. Norton iii. McAfee iv. AVG v. Kaspersky 2. Viruses and......

Words: 1291 - Pages: 6

Crack Epidemic

...In 80s and 90s the crack epidemic took over the ghetto world and played a big role in developing hip hop music. Black Americans even sung about it in their songs. Drug dealers distributed crack in black neighborhoods and got them involved into that business. For African Americans it was a way to earn money and get out of ghetto. Especially back then when they were discriminated. So, the crack epidemic and hip hop back in 80s and 90s went hand in hand. It was very interesting to read the "Dark Alliance". I found out a lot of interesting staff of which I didn't know before. Of course, not every black american was involved in drug distribution and consumption. There were the ones who worked hard to pursue their dreams; however, there were more people who consumed and distributed than those who didn't. Rappers raped about it in their songs. The song "White Lines" describes how at parties MC and other party people consumed it. MC also tells us about his feelings and illusions he had. Once, people get involved into the crack epidemic, it is hard to stop. Also in the song, MC tells that every time you want it more and more. So, the dosage increases and money decreases. Some still suffer from the crack epidemic. People who used to party and play cool are now addicts who just think about getting drugs. The Crack Epidemic brought violence and sickness. People on crack are not stable and can think straight. As a consequence they are more violent and uncontrollable. People also become......

Words: 767 - Pages: 4

Crack

...CRACK Should women addicted to crack be able to have children? Barbara Harris says no. Harris has adopted four children from a drug addict. She has also founded CRACK (Children Requiring A Caring Kommunity) a non-profit organization that offers $200 in cash to addicts who agree to be sterilized or undergo long-term contraception like Norplant, which is surgically imbedded under the skin. In this essay I will be discussing what the ethical dilemma is, who the stakeholders are in this ethical dilemma, analyzing the problem by reference to the categorical imperative, analyzing the problem from a Kantian and utilitarian standpoint and giving my overall opinion of this matter. As I understand it the ethical dilemma here is the procedure in itself. Some are saying that the women are doing it for the money to buy more drugs. Also, saying that it takes away women rights to reproduce. Physicians and attorneys are saying that the women are in no condition to consent to being sterilized. They say that because these women are mentally ill and poor they are not capable of making their own decisions. But Barbara Harris from her own experiences says that women addicted to crack do not need to have babies. These women are bringing babies into the world addicted to crack. She tells of a story of how she adopted four children from a crack addicted woman. One of the children would wake up screaming in the middle of the night. She says it looked like his eyes were about to pop out of his......

Words: 1057 - Pages: 5