LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Closed Thread
  Search this Thread
Old 07-31-2012, 10:07 AM   #1
chinese_ys
LQ Newbie
 
Registered: Aug 2007
Posts: 8

Rep: Reputation: 0
WEP is really that easy to Crack?


Please note, all the information below are for used in private LAB environment. Purely for Pentest purpose!!

Hey, there

I saw article all-over the places saying WEP is insecure and crackable in 5 min. But I never did that by myself. Since I have a lab to play with now, I want to give it a try to see exactly how weak it is. But I do not think modem AP with WEP is still easy to manipulate... Here is my setup and test:

I have an Cisco AP configured with 2 SSIDs: Test1 and Test2. Test1 is hidden with WPA2 encryption and Radius Authentication; Test2 is hidden with WEP encrption and open authentication.

I used latest BT5 on a laptop with an Intel Wireless WIFI 4965 card. I can find the SSID and channel using airodump-ng but failed to use aireplay-ng for fake-authentication, which also means I could not manipulate traffic to AP for actual traffic capture for final analyse to crack the key.

Do you think this is because the AP has special feature OR the SSID Test1 is using WPA2 while sharing the same MAC ADDRESS with SSID Test2?

Comments plz.

Last edited by chinese_ys; 07-31-2012 at 10:12 AM.
 
Old 07-31-2012, 12:28 PM   #2
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,671
Blog Entries: 4

Rep: Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945
When a wireless link secured with WEP transfers a significant amount of data that is known or predictable, it's possible to deduce the (one... unchanging...) key using regular cryptographic techniques which can be automated.

WPA2 and its kin address this issue ... without any change of hardware ... through dynamic key-management: the encryption keys are generated randomly and regular changes of the key are negotiated. So there is a much smaller set of data that is encrypted using any one key, and the previous or next key could be "anything at all." Other protocols including SSLx, VPN and so-on use the same approach.
 
Old 07-31-2012, 01:00 PM   #3
chinese_ys
LQ Newbie
 
Registered: Aug 2007
Posts: 8

Original Poster
Rep: Reputation: 0
Quote:
Originally Posted by sundialsvcs View Post
When a wireless link secured with WEP transfers a significant amount of data that is known or predictable, it's possible to deduce the (one... unchanging...) key using regular cryptographic techniques which can be automated.

WPA2 and its kin address this issue ... without any change of hardware ... through dynamic key-management: the encryption keys are generated randomly and regular changes of the key are negotiated. So there is a much smaller set of data that is encrypted using any one key, and the previous or next key could be "anything at all." Other protocols including SSLx, VPN and so-on use the same approach.
Sorry, but what you trying to tell me? difference between WEP and WPA2? If so, that was not my question...
 
Old 07-31-2012, 02:30 PM   #4
Noway2
Senior Member
 
Registered: Jul 2007
Distribution: Gentoo
Posts: 2,125

Rep: Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781
Quote:
difference between WEP and WPA2? If so, that was not my question.
....
used latest BT5 on a laptop with an Intel Wireless WIFI 4965 card. I can find the SSID and channel using airodump-ng but failed to use aireplay-ng for fake-authentication, which also means I could not manipulate traffic to AP for actual traffic capture for final analyse to crack the key.

Do you think this is because the AP has special feature OR the SSID Test1 is using WPA2 while sharing the same MAC ADDRESS with SSID Test2?
It sounds like you are asking why you were not able to inject sufficient packets into the access point cause artificial traffic that you could thereby use to deduce the WEP key. As sundialsvcs pointed out, WEP cracking takes place through a statistical analysis of a sufficiently large data set and WPA2 does not have this weakness. For whatever reason you were not able to induce the traffic needed to crack the password. There are several reasons why this could be, including insufficient signal strength and hardware or a driver that doesn't support this activity.

Now as to why you were unsuccessful with respect to being able to "manipulate traffic to AP for actual traffic capture" I would recommend that you read the forum rules, in particular rule 14.
Quote:
Posts containing information about cracking, piracy, warez, fraud or any topic that could be damaging to either LinuxQuestions.org or any third party will be immediately removed.
While I can't speak for the forum administration I think that discussing the theoretical and practical differences between WEP and WPA and why WPA is significantly more secure than WEP and using your own test set is fine. Asking for help in troubleshooting why your cracking technique failed using a particular tool, which will effectively give a "how to" engage in this practice would be better left alone.
 
3 members found this post helpful.
Old 07-31-2012, 02:55 PM   #5
chinese_ys
LQ Newbie
 
Registered: Aug 2007
Posts: 8

Original Poster
Rep: Reputation: 0
You could simply just reply as
Quote:
Originally Posted by Noway2 View Post
There are several reasons why this could be, including insufficient signal strength and hardware or a driver that doesn't support this activity.

Quote:
Posts containing information about cracking, piracy, warez, fraud or any topic that could be damaging to either LinuxQuestions.org or any third party will be immediately removed.
Thanks for taking time finding the specific section of the forum rule I stated on the very top that this is for pentest in lab environment... I presented 2 possibilities in original post that might cause issue and I am trying to collect opinions. If I want to use this post to do troubleshooting, should I simply ask how to get it work?
 
Old 07-31-2012, 06:49 PM   #6
TB0ne
LQ Guru
 
Registered: Jul 2003
Location: Birmingham, Alabama
Distribution: SuSE, RedHat, Slack,CentOS
Posts: 26,680

Rep: Reputation: 7971Reputation: 7971Reputation: 7971Reputation: 7971Reputation: 7971Reputation: 7971Reputation: 7971Reputation: 7971Reputation: 7971Reputation: 7971Reputation: 7971
Quote:
Originally Posted by chinese_ys View Post
You could simply just reply as

Thanks for taking time finding the specific section of the forum rule I stated on the very top that this is for pentest in lab environment... I presented 2 possibilities in original post that might cause issue and I am trying to collect opinions. If I want to use this post to do troubleshooting, should I simply ask how to get it work?
Yes, we know what you said...however, there is no way for us to KNOW that you aren't trying to do something else with the information. That's what makes requests like this a touchy subject, and why there are forum rules against it. Those rules should have been visible to you when you signed up.
 
Old 07-31-2012, 10:29 PM   #7
jschiwal
LQ Guru
 
Registered: Aug 2001
Location: Fargo, ND
Distribution: SuSE AMD64
Posts: 15,733

Rep: Reputation: 682Reputation: 682Reputation: 682Reputation: 682Reputation: 682Reputation: 682
Opps, wrong forum.

Last edited by jschiwal; 07-31-2012 at 10:30 PM.
 
Old 08-01-2012, 01:44 AM   #8
segmentation_fault
Member
 
Registered: Sep 2008
Location: Ioannina, Greece
Distribution: Gentoo
Posts: 332

Rep: Reputation: 55
And, to answer the original question, yes, it's that easy. I have done it in my personal access point, but it already had traffic; I didn't generate it.
 
Old 08-01-2012, 03:50 AM   #9
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by chinese_ys View Post
Thanks for taking time finding the specific section of the forum rule
...and likewise thanks for taking the time to adhere to that specific section of the LQ Rules.
 
  


Closed Thread



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: How to crack a wireless WEP key using AIR Crack LXer Syndicated Linux News 1 05-09-2010 07:59 AM
WEP key crack Cap_pro Linux - Wireless Networking 14 09-21-2007 01:58 PM
wifi wep key crack Cap_pro Linux - Security 2 09-18-2007 07:58 AM
Howeasy is it to crack wep greendusk Linux - Wireless Networking 22 08-15-2005 05:14 AM
Can anyone recommend WEP crack program? inthefuture Linux - Security 5 07-03-2004 01:39 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 04:13 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration