• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

Wep0ff – Wireless WEP Key Cracker Tool

January 19, 2007

Views: 531,049

Wep0ff is new WEP Key Cracker that can function without access to AP, it works by mounting a fake access point attack against WEP-based wireless clients.

Wep0ff - Wireless WEP Key Cracker Tool

It uses a combination of fragmentation and evil twin attacks to generate traffic which can be used for KoreK-style WEP-key recovery.

This tool can be used to mount fake access point attack against WEP-based wireless clients.

This code tested patched madwifi-old drivers with athraw support but also works with madwifi-ng. With madwifi-ng you need to create two virtual interfaces: one in master mode (for fake AP) and second in monitor mode (to listen on).

What is WEP Cracking?

Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standard ratified in 1997, its intention was to provide data confidentiality comparable to that of a traditional wired network.

It’s fairly easy to crack WEP due to flaws in the algorithm if you are setting up your WiFi network you should opt for WPA.

How to Use the WEP Key Cracker Tool

1. Setup fake AP with KARMA tools or iwconfig

1
2
3
4
5
6
iwpriv ath0 mode 2
iwconfig ath0 mode master essid foo enc 1122334455 channel 7
echo 1 > /proc/sys/dev/ath0/rawdev
echo 1 > /proc/sys/dev/ath0/rawdev_type
ifconfig ath0
up ifconfig ath0raw up<

2. Start this program (./wep0ff ath0raw 00:01:02:03:04:05)
3. Wait until client connect to fake access point
4. Launch airodump-ng to collect packets
5. Launch aircrack-ng to recover WEP key

You can download it here:

wepoff.tar.gz

Related Posts:

  • An Introduction To Web Application Security Systems
  • Autoswagger - Automated discovery and testing of…
  • What You Need To Know About KRACK WPA2 Wi-Fi Attack
  • SetupHijack - Installer and Updater Race Condition…
  • IAMhounddog - Practical AWS IAM Relationship Mapping…
  • Privacy Implications of Web 3.0 and Darknets
Share
Tweet
Share
Buffer
WhatsApp
Email

Filed Under: Hacking Tools, Networking Hacking Tools, Wireless Hacking Tagged With: evil twin attack, wifi-cracking, wifi-hacking, wifi-jacking, Wireless Hacking, wireless-cracking



Reader Interactions

Comments

  1. jimmy says

    February 7, 2007 at 11:01 pm

    hi what os is this used on?

  2. Gouki says

    February 8, 2007 at 3:09 am

    GNU/Linux

  3. DotSlashZero says

    June 1, 2007 at 9:20 pm

    Can it be used on Cygwin?
    i have a fedora in another computer but i’d do better in my laptop in which i only have cygwin… i gess i’d have to install a lot of software huh?
    like iwconfig or something?

  4. Darknet says

    June 3, 2007 at 9:41 am

    DotSlashZero: I don’t tend to use tools like this on Cygwin as they require native driver support, which windows doesn’t give. I would suggest setting up a VMWare image of a Linux install or just use a liveCD like Backtrack to access tools like this.

  5. DotSlashZero says

    June 3, 2007 at 1:13 pm

    VMWare image of a Linux? is that like a virtual linux within windows? i have a linux version called DSL Damn Small Linux and i think it does that… am i right?

  6. Chris says

    November 29, 2007 at 5:12 pm

    What of a Wepkey crack for windows?

  7. yogesh says

    April 19, 2008 at 8:41 pm

    good

  8. Hyper says

    April 29, 2008 at 2:19 pm

    Does these tools (airodump-ng, KARMA tools or iwconfig,aircrack-ng) work with all wireless cards. Because i have tried some other tools before and had to be atheros wireless card (something like this)

  9. bob says

    July 27, 2008 at 2:59 am

    hey dudes once you have a wep key how do you recover the original password from that

  10. shakezz says

    August 6, 2008 at 7:54 am

    i have a windows vista laptop and no wep hack programs seem to be compatible, can somebody suggest one.

  11. winx says

    August 15, 2008 at 1:35 pm

    most tools like this tend to require specific wifi cards (usb afaik just aint good enough) with specific chips atheros and prisim chips are (to my knowledge) the most widely used. look hard enough and you’ll find which ones are compatible with wep cracking tools

  12. sunny says

    August 28, 2008 at 7:05 pm

    i want this software comfortabe for win vista and wireless (dell wireless 1395 wlan mini card)

  13. maysiool says

    December 5, 2008 at 9:25 pm

    nice and good for everybody

  14. k-ryder says

    December 9, 2008 at 10:11 pm

    i have toshiba satellite laptop with Vista premium. will this program work on my pc or do i have to get another cpu like my IBM

  15. wepkey says

    December 23, 2008 at 1:06 am

    hey men so how could we get this baby working im using windows vista your help is much appriciated thankx

  16. navin says

    December 23, 2008 at 12:50 pm

    people ought to learn to read!! Dear Mr. wepkey, Wep0ff runs on the Linux OS, and does not run on the Windows Vista OS

    As such U need to either, a) install linux on your comp/lappy
    b)use a live CD (Backtrack is recommended by most L337 h@xors)
    c)Create a virtual drive using a tool like wubi (for ubuntu) on your system and install and run Linux off it

    Using these steps you can , as you put it, “get this baby working”

    n00b <– That my friend, is a complement of the highest order for people like U!! ;)

  17. Bogwitch says

    December 23, 2008 at 2:00 pm

    Heh – I thought all the morons asking for Vista versions were trolling.

    That’s the Interwebs for ya!

  18. avinash says

    March 27, 2009 at 8:24 am

    which type of file or softwar .tar

  19. 3p1c says

    April 7, 2009 at 6:17 pm

    i’ve got a toshiba satellite with a 802.11a/g/n wireless, i been obtaining a few connections locally, i was wondering if you could help :D

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Reconnoitre - Open-Source Reconnaissance and Service Enumeration Tool

Reconnoitre – Open-Source Reconnaissance and Service Enumeration Tool

Views: 306

Reconnoitre is an open-source reconnaissance tool that automates multithreaded information gathering … ...More about Reconnoitre – Open-Source Reconnaissance and Service Enumeration Tool

Scanners-Box - Open-Source Reconnaissance and Scanning Toolkit

Scanners-Box – Open-Source Reconnaissance and Scanning Toolkit

Views: 480

Scanners-Box is an open-source, community-curated collection of scanners and reconnaissance … ...More about Scanners-Box – Open-Source Reconnaissance and Scanning Toolkit

Red Teaming LLMs 2025 - Offensive Security Meets Generative AI

Red Teaming LLMs 2025 – Offensive Security Meets Generative AI

Views: 516

As enterprises deploy large language models (LLMs) at scale, the offensive security discipline of … ...More about Red Teaming LLMs 2025 – Offensive Security Meets Generative AI

gitlab-runner-research - PoC for abusing self-hosted GitLab runners

gitlab-runner-research – PoC for abusing self-hosted GitLab runners

Views: 335

gitlab-runner-research is a proof-of-concept repository and write-up that demonstrates how attackers … ...More about gitlab-runner-research – PoC for abusing self-hosted GitLab runners

mcp-scanner - Python MCP Scanner for Prompt-Injection and Insecure Agents

mcp-scanner – Python MCP Scanner for Prompt-Injection and Insecure Agents

Views: 581

mcp-scanner is an open-source Python tool that scans Model Context Protocol (MCP) servers and agent … ...More about mcp-scanner – Python MCP Scanner for Prompt-Injection and Insecure Agents

Deepfake-as-a-Service 2025 - How Voice Cloning and Synthetic Media Fraud Are Changing Enterprise Defenses

Deepfake-as-a-Service 2025 – How Voice Cloning and Synthetic Media Fraud Are Changing Enterprise Defenses

Views: 669

Deepfake operations have matured into a commercial model that attackers package as … ...More about Deepfake-as-a-Service 2025 – How Voice Cloning and Synthetic Media Fraud Are Changing Enterprise Defenses

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (8)
  • Countermeasures (231)
  • Cryptography (85)
  • Dark Web (4)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (433)
  • Forensics (64)
  • GenAI (12)
  • Hacker Culture (10)
  • Hacking News (236)
  • Hacking Tools (708)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (241)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (107)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (171)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,394,898)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,813)
  • Top 15 Security Utilities & Download Hacking Tools (2,097,292)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,200,141)
  • Password List Download Best Word List – Most Common Passwords (934,345)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (777,066)
  • Hack Tools/Exploits (673,983)
  • Wep0ff – Wireless WEP Key Cracker Tool (531,049)

Search

Recent Posts

  • Reconnoitre – Open-Source Reconnaissance and Service Enumeration Tool November 10, 2025
  • Scanners-Box – Open-Source Reconnaissance and Scanning Toolkit November 7, 2025
  • Red Teaming LLMs 2025 – Offensive Security Meets Generative AI November 5, 2025
  • gitlab-runner-research – PoC for abusing self-hosted GitLab runners November 3, 2025
  • mcp-scanner – Python MCP Scanner for Prompt-Injection and Insecure Agents October 31, 2025
  • Deepfake-as-a-Service 2025 – How Voice Cloning and Synthetic Media Fraud Are Changing Enterprise Defenses October 29, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy