As we are familiar with our usual setup of sniffing packets. We will now go ahead and crack the WEP key of a WEP enabled wifi network.
The basic breakdown of this will be
1) Start the wireless interface in monitor mode on the specific AP channel
2)Test the injection capability of the wireless device to the AP
3)Use aireplay-ng to do a fake authentication with the access point
4)Start airodump-ng on AP channel with a bssid filter to collect the new unique IVs
5)Start aireplay-ng in ARP request replay mode to inject packets
6)Run aircrack-ng to crack key using the IVs collected
To crack WEP, we will need to launch console.Then type the following to get the list of network interfaces:-
The interface we had created in our first demo was mon0 lets create another monitor mode "ra0" this time. However, this is not compulsory and you can work with even mon0 as well. You might have a different interface name, that doesn't matter. Use your own monitor mode interface.
Now, run the following four commands and see the output of these commands in the screenshot.
airmon-ng stop (interface)
ifconfig (interface) down
macchanger --mac 00:11:22:33:44:55 (interface)
airmon-ng start (interface)
If you get the similar output as the image here, congrats!! You've successfully faked a new MAC address on your network interface 00:11:22:33:44:55
Now, Let’s see what is going on the network. Run: