• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

Wep0ff – Wireless WEP Key Cracker Tool

January 19, 2007

Views: 530,461

Wep0ff is new WEP Key Cracker that can function without access to AP, it works by mounting a fake access point attack against WEP-based wireless clients.

Wep0ff - Wireless WEP Key Cracker Tool

It uses a combination of fragmentation and evil twin attacks to generate traffic which can be used for KoreK-style WEP-key recovery.

This tool can be used to mount fake access point attack against WEP-based wireless clients.

This code tested patched madwifi-old drivers with athraw support but also works with madwifi-ng. With madwifi-ng you need to create two virtual interfaces: one in master mode (for fake AP) and second in monitor mode (to listen on).

What is WEP Cracking?

Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standard ratified in 1997, its intention was to provide data confidentiality comparable to that of a traditional wired network.

It’s fairly easy to crack WEP due to flaws in the algorithm if you are setting up your WiFi network you should opt for WPA.

How to Use the WEP Key Cracker Tool

1. Setup fake AP with KARMA tools or iwconfig

1
2
3
4
5
6
iwpriv ath0 mode 2
iwconfig ath0 mode master essid foo enc 1122334455 channel 7
echo 1 > /proc/sys/dev/ath0/rawdev
echo 1 > /proc/sys/dev/ath0/rawdev_type
ifconfig ath0
up ifconfig ath0raw up<

2. Start this program (./wep0ff ath0raw 00:01:02:03:04:05)
3. Wait until client connect to fake access point
4. Launch airodump-ng to collect packets
5. Launch aircrack-ng to recover WEP key

You can download it here:

wepoff.tar.gz

Related Posts:

  • An Introduction To Web Application Security Systems
  • What You Need To Know About KRACK WPA2 Wi-Fi Attack
  • Privacy Implications of Web 3.0 and Darknets
  • Fern Wifi Cracker - Wireless Security Auditing Tool
  • PentestGPT - AI-Powered Penetration Testing Assistant
  • Hijacker - Reaver For Android Wifi Hacker App
Share
Tweet
Share
Buffer
WhatsApp
Email
0 Shares

Filed Under: Hacking Tools, Networking Hacking Tools, Wireless Hacking Tagged With: evil twin attack, wifi-cracking, wifi-hacking, wifi-jacking, Wireless Hacking, wireless-cracking



Reader Interactions

Comments

  1. jimmy says

    February 7, 2007 at 11:01 pm

    hi what os is this used on?

  2. Gouki says

    February 8, 2007 at 3:09 am

    GNU/Linux

  3. DotSlashZero says

    June 1, 2007 at 9:20 pm

    Can it be used on Cygwin?
    i have a fedora in another computer but i’d do better in my laptop in which i only have cygwin… i gess i’d have to install a lot of software huh?
    like iwconfig or something?

  4. Darknet says

    June 3, 2007 at 9:41 am

    DotSlashZero: I don’t tend to use tools like this on Cygwin as they require native driver support, which windows doesn’t give. I would suggest setting up a VMWare image of a Linux install or just use a liveCD like Backtrack to access tools like this.

  5. DotSlashZero says

    June 3, 2007 at 1:13 pm

    VMWare image of a Linux? is that like a virtual linux within windows? i have a linux version called DSL Damn Small Linux and i think it does that… am i right?

  6. Chris says

    November 29, 2007 at 5:12 pm

    What of a Wepkey crack for windows?

  7. yogesh says

    April 19, 2008 at 8:41 pm

    good

  8. Hyper says

    April 29, 2008 at 2:19 pm

    Does these tools (airodump-ng, KARMA tools or iwconfig,aircrack-ng) work with all wireless cards. Because i have tried some other tools before and had to be atheros wireless card (something like this)

  9. bob says

    July 27, 2008 at 2:59 am

    hey dudes once you have a wep key how do you recover the original password from that

  10. shakezz says

    August 6, 2008 at 7:54 am

    i have a windows vista laptop and no wep hack programs seem to be compatible, can somebody suggest one.

  11. winx says

    August 15, 2008 at 1:35 pm

    most tools like this tend to require specific wifi cards (usb afaik just aint good enough) with specific chips atheros and prisim chips are (to my knowledge) the most widely used. look hard enough and you’ll find which ones are compatible with wep cracking tools

  12. sunny says

    August 28, 2008 at 7:05 pm

    i want this software comfortabe for win vista and wireless (dell wireless 1395 wlan mini card)

  13. maysiool says

    December 5, 2008 at 9:25 pm

    nice and good for everybody

  14. k-ryder says

    December 9, 2008 at 10:11 pm

    i have toshiba satellite laptop with Vista premium. will this program work on my pc or do i have to get another cpu like my IBM

  15. wepkey says

    December 23, 2008 at 1:06 am

    hey men so how could we get this baby working im using windows vista your help is much appriciated thankx

  16. navin says

    December 23, 2008 at 12:50 pm

    people ought to learn to read!! Dear Mr. wepkey, Wep0ff runs on the Linux OS, and does not run on the Windows Vista OS

    As such U need to either, a) install linux on your comp/lappy
    b)use a live CD (Backtrack is recommended by most L337 h@xors)
    c)Create a virtual drive using a tool like wubi (for ubuntu) on your system and install and run Linux off it

    Using these steps you can , as you put it, “get this baby working”

    n00b <– That my friend, is a complement of the highest order for people like U!! ;)

  17. Bogwitch says

    December 23, 2008 at 2:00 pm

    Heh – I thought all the morons asking for Vista versions were trolling.

    That’s the Interwebs for ya!

  18. avinash says

    March 27, 2009 at 8:24 am

    which type of file or softwar .tar

  19. 3p1c says

    April 7, 2009 at 6:17 pm

    i’ve got a toshiba satellite with a 802.11a/g/n wireless, i been obtaining a few connections locally, i was wondering if you could help :D

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Defending Against Malicious Botnets in 2025 Automated Traffic Threats and Mitigation

Defending Against Malicious Botnets in 2025 Automated Traffic Threats and Mitigation

Views: 167

Automated internet traffic will now overtake human activity, presenting sophisticated cyber threats … ...More about Defending Against Malicious Botnets in 2025 Automated Traffic Threats and Mitigation

TREVORspray - Credential Spray Toolkit for Azure, Okta, OWA & More

TREVORspray – Credential Spray Toolkit for Azure, Okta, OWA & More

Views: 337

TREVORspray is a purpose-built password spraying utility designed for red teams and offensive … ...More about TREVORspray – Credential Spray Toolkit for Azure, Okta, OWA & More

Force Push Scanner - Hunt GitHub Dangling Commits for Leaked Secrets

Force Push Scanner – Hunt GitHub Dangling Commits for Leaked Secrets

Views: 346

Force Push Scanner is an offensive security tool that identifies secrets inadvertently left in … ...More about Force Push Scanner – Hunt GitHub Dangling Commits for Leaked Secrets

Emerging Darknet Marketplaces of 2025 Anatomy Tactics & Trends

Emerging Darknet Marketplaces of 2025 Anatomy Tactics & Trends

Views: 5,328

Darknet marketplaces remain central to illicit trade in 2025, with evolving business models, payment … ...More about Emerging Darknet Marketplaces of 2025 Anatomy Tactics & Trends

Caracal - Rust eBPF Rootkit for Stealthy Post-Exploitation

Caracal – Rust eBPF Rootkit for Stealthy Post-Exploitation

Views: 517

Caracal is a new Rust-based eBPF (extended Berkeley Packet Filter) rootkit that provides a stealth … ...More about Caracal – Rust eBPF Rootkit for Stealthy Post-Exploitation

Windows_EndPoint_Audit - Endpoint Security Auditing Toolkit

Windows_EndPoint_Audit – Endpoint Security Auditing Toolkit

Views: 572

Windows_EndPoint_Audit from ITAuditMaverick introduces a powerful method for offensive security … ...More about Windows_EndPoint_Audit – Endpoint Security Auditing Toolkit

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (2)
  • Countermeasures (231)
  • Cryptography (84)
  • Dark Web (1)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (432)
  • Forensics (65)
  • GenAI (4)
  • Hacker Culture (9)
  • Hacking News (231)
  • Hacking Tools (688)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (240)
  • Networking Hacking Tools (353)
  • Password Cracking Tools (105)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (236)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (170)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,333,672)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,358)
  • Top 15 Security Utilities & Download Hacking Tools (2,096,839)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,199,812)
  • Password List Download Best Word List – Most Common Passwords (933,802)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (776,474)
  • Hack Tools/Exploits (673,479)
  • Wep0ff – Wireless WEP Key Cracker Tool (530,461)

Search

Recent Posts

  • Defending Against Malicious Botnets in 2025 Automated Traffic Threats and Mitigation July 16, 2025
  • TREVORspray – Credential Spray Toolkit for Azure, Okta, OWA & More July 14, 2025
  • Force Push Scanner – Hunt GitHub Dangling Commits for Leaked Secrets July 11, 2025
  • Emerging Darknet Marketplaces of 2025 Anatomy Tactics & Trends July 9, 2025
  • Caracal – Rust eBPF Rootkit for Stealthy Post-Exploitation July 7, 2025
  • Windows_EndPoint_Audit – Endpoint Security Auditing Toolkit July 4, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy