• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

Wep0ff – Wireless WEP Key Cracker Tool

January 19, 2007

Views: 531,368

Wep0ff is new WEP Key Cracker that can function without access to AP, it works by mounting a fake access point attack against WEP-based wireless clients.

Wep0ff - Wireless WEP Key Cracker Tool

It uses a combination of fragmentation and evil twin attacks to generate traffic which can be used for KoreK-style WEP-key recovery.

This tool can be used to mount fake access point attack against WEP-based wireless clients.

This code tested patched madwifi-old drivers with athraw support but also works with madwifi-ng. With madwifi-ng you need to create two virtual interfaces: one in master mode (for fake AP) and second in monitor mode (to listen on).

What is WEP Cracking?

Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standard ratified in 1997, its intention was to provide data confidentiality comparable to that of a traditional wired network.

It’s fairly easy to crack WEP due to flaws in the algorithm if you are setting up your WiFi network you should opt for WPA.

How to Use the WEP Key Cracker Tool

1. Setup fake AP with KARMA tools or iwconfig

1
2
3
4
5
6
iwpriv ath0 mode 2
iwconfig ath0 mode master essid foo enc 1122334455 channel 7
echo 1 > /proc/sys/dev/ath0/rawdev
echo 1 > /proc/sys/dev/ath0/rawdev_type
ifconfig ath0
up ifconfig ath0raw up<

2. Start this program (./wep0ff ath0raw 00:01:02:03:04:05)
3. Wait until client connect to fake access point
4. Launch airodump-ng to collect packets
5. Launch aircrack-ng to recover WEP key

You can download it here:

wepoff.tar.gz

Related Posts:

  • mcp-scan - Real-Time Guardrail Monitoring and…
  • Infernal Twin Updated 2.6.11 - Automated Wireless…
  • airgeddon - Wireless Security Auditing Script
  • An Introduction To Web Application Security Systems
  • Autoswagger - Automated discovery and testing of…
  • IAMhounddog - Practical AWS IAM Relationship Mapping…
Share
Tweet
Share
Buffer
WhatsApp
Email

Filed Under: Hacking Tools, Networking Hacking Tools, Wireless Hacking Tagged With: evil twin attack, wifi-cracking, wifi-hacking, wifi-jacking, Wireless Hacking, wireless-cracking



Reader Interactions

Comments

  1. jimmy says

    February 7, 2007 at 11:01 pm

    hi what os is this used on?

  2. Gouki says

    February 8, 2007 at 3:09 am

    GNU/Linux

  3. DotSlashZero says

    June 1, 2007 at 9:20 pm

    Can it be used on Cygwin?
    i have a fedora in another computer but i’d do better in my laptop in which i only have cygwin… i gess i’d have to install a lot of software huh?
    like iwconfig or something?

  4. Darknet says

    June 3, 2007 at 9:41 am

    DotSlashZero: I don’t tend to use tools like this on Cygwin as they require native driver support, which windows doesn’t give. I would suggest setting up a VMWare image of a Linux install or just use a liveCD like Backtrack to access tools like this.

  5. DotSlashZero says

    June 3, 2007 at 1:13 pm

    VMWare image of a Linux? is that like a virtual linux within windows? i have a linux version called DSL Damn Small Linux and i think it does that… am i right?

  6. Chris says

    November 29, 2007 at 5:12 pm

    What of a Wepkey crack for windows?

  7. yogesh says

    April 19, 2008 at 8:41 pm

    good

  8. Hyper says

    April 29, 2008 at 2:19 pm

    Does these tools (airodump-ng, KARMA tools or iwconfig,aircrack-ng) work with all wireless cards. Because i have tried some other tools before and had to be atheros wireless card (something like this)

  9. bob says

    July 27, 2008 at 2:59 am

    hey dudes once you have a wep key how do you recover the original password from that

  10. shakezz says

    August 6, 2008 at 7:54 am

    i have a windows vista laptop and no wep hack programs seem to be compatible, can somebody suggest one.

  11. winx says

    August 15, 2008 at 1:35 pm

    most tools like this tend to require specific wifi cards (usb afaik just aint good enough) with specific chips atheros and prisim chips are (to my knowledge) the most widely used. look hard enough and you’ll find which ones are compatible with wep cracking tools

  12. sunny says

    August 28, 2008 at 7:05 pm

    i want this software comfortabe for win vista and wireless (dell wireless 1395 wlan mini card)

  13. maysiool says

    December 5, 2008 at 9:25 pm

    nice and good for everybody

  14. k-ryder says

    December 9, 2008 at 10:11 pm

    i have toshiba satellite laptop with Vista premium. will this program work on my pc or do i have to get another cpu like my IBM

  15. wepkey says

    December 23, 2008 at 1:06 am

    hey men so how could we get this baby working im using windows vista your help is much appriciated thankx

  16. navin says

    December 23, 2008 at 12:50 pm

    people ought to learn to read!! Dear Mr. wepkey, Wep0ff runs on the Linux OS, and does not run on the Windows Vista OS

    As such U need to either, a) install linux on your comp/lappy
    b)use a live CD (Backtrack is recommended by most L337 h@xors)
    c)Create a virtual drive using a tool like wubi (for ubuntu) on your system and install and run Linux off it

    Using these steps you can , as you put it, “get this baby working”

    n00b <– That my friend, is a complement of the highest order for people like U!! ;)

  17. Bogwitch says

    December 23, 2008 at 2:00 pm

    Heh – I thought all the morons asking for Vista versions were trolling.

    That’s the Interwebs for ya!

  18. avinash says

    March 27, 2009 at 8:24 am

    which type of file or softwar .tar

  19. 3p1c says

    April 7, 2009 at 6:17 pm

    i’ve got a toshiba satellite with a 802.11a/g/n wireless, i been obtaining a few connections locally, i was wondering if you could help :D

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Systemic Ransomware Events in 2025 - How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Views: 1,838

Jaguar Land Rover’s prolonged cyber outage in 2025 turned what would once have been a “single … ...More about Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

SmbCrawler - SMB Share Discovery and Secret-Hunting

SmbCrawler – SMB Share Discovery and Secret-Hunting

Views: 1,746

SmbCrawler is a credentialed SMB spider that takes domain credentials and a list of hosts, then … ...More about SmbCrawler – SMB Share Discovery and Secret-Hunting

Heisenberg Dependency Health Check - GitHub Action for Supply Chain Risk

Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Views: 1,122

Heisenberg Dependency Health Check is a GitHub Action that inspects only the new or modified … ...More about Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Dark Web Search Engines in 2025 - Enterprise Monitoring, APIs and IOC Hunting

Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

Views: 2,841

Dark web search engines have become essential for enterprise security teams that need early … ...More about Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

mcp-scan - Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Views: 1,044

mcp-scan is a security tool from Invariant Labs that can run as a static scanner or as a dynamic … ...More about mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Initial Access Brokers (IAB) in 2025 - From Dark Web Listings to Supply Chain Ransomware Events

Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Views: 924

Initial Access Brokers (IABs) have moved from niche forum actors to central wholesalers in the … ...More about Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (8)
  • Countermeasures (232)
  • Cryptography (85)
  • Dark Web (6)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (433)
  • Forensics (64)
  • GenAI (13)
  • Hacker Culture (10)
  • Hacking News (237)
  • Hacking Tools (709)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (241)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (107)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (171)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,424,793)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,174,078)
  • Top 15 Security Utilities & Download Hacking Tools (2,097,505)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,200,313)
  • Password List Download Best Word List – Most Common Passwords (934,597)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (777,334)
  • Hack Tools/Exploits (674,283)
  • Wep0ff – Wireless WEP Key Cracker Tool (531,368)

Search

Recent Posts

  • Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like November 26, 2025
  • SmbCrawler – SMB Share Discovery and Secret-Hunting November 24, 2025
  • Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk November 21, 2025
  • Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting November 19, 2025
  • mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers November 17, 2025
  • Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events November 12, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2026 Darknet All Rights Reserved · Privacy Policy