WEP is a protocol for securing wireless LANs. WEP stands for “Wired Equivalent Privacy” which means it should provide the level of protection a wired LAN has. WEP therefore uses the RC4 stream to encrypt data which is transmitted over the air, using usually a single secret key (called the root key or WEP key) of a length of 40 or 104 bit.
A history of WEP and RC4
WEP was previously known to be insecure. In 2001 Scott Fluhrer, Itsik Mantin, and Adi Shamir published an analysis of the RC4 stream cipher. Some time later, it was shown that this attack can be applied to WEP and the secret key can be recovered from about 4,000,000 to 6,000,000 captured data packets. In 2004 a hacker named KoReK improved the attack: the complexity of recovering a 104 bit secret key was reduced to 500,000 to 2,000,000 captured packets.
In 2005, Andreas Klein presented another analysis of the RC4 stream cipher. Klein showed that there are more correlations between the RC4 keystream and the key than the ones found by Fluhrer, Mantin, and Shamir which can additionally be used to break WEP in WEP like usage modes.
The aircrack-ptw attack
The aircrack team were able to extend Klein’s attack and optimize it for usage against WEP. Using this version, it is possible to recover a 104 bit WEP key with probability 50% using just 40,000 captured packets. For 60,000 available data packets, the success probability is about 80% and for 85,000 data packets about 95%. Using active techniques like deauth and ARP re-injection, 40,000 packets can be captured in less than one minute under good condition. The actual computation takes about 3 seconds and 3 MB main memory on a Pentium-M 1.7 GHz and can additionally be optimized for devices with slower CPUs. The same attack can be used for 40 bit keys too with an even higher success probability.
We believe that WEP should not be used anymore in sensitive environments. Most wireless equipment vendors provide support for TKIP (as known as WPA1) and CCMP (also known as WPA2) which provides a much higher security level. All users should switch to WPA1 or even better WPA2.
You can download aircrack-ptw here:
Or read more here.
Find an aircrack-ptw How To here.
Please note aircrack-ptw should be used together with the aircrack-ng toolsuite.
- InsomniaShell – ASP.NET Reverse Shell Or Bind Shell
- WhatWeb – Identify CMS, Blogging Platform, Stats Packages & More
- Kali Linux – The Most Advanced Penetration Testing Linux Distribution
- aircrack-ng – WEP and WPA-PSK Key Cracking Program
- WEPBuster – Wireless Security Assessment Tool – WEP Cracking
- Moscrack – Cluster Cracking Tool For WPA Keys
Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,878,637 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,075,861 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 629,217 views