Anybody using wireless who uses wep (or none: open connection), instead of wpa2 is asking to get hacked
--since wireless is a radio (transmission), any antenna than can monitor it can possibly crack it, wep (easy), wpa2 (a little more involved)
Nope but its function is to crack wireless connections..
What is WepLab?Not all wireless cards will operate in monitor mode
WepLab is a tool designed to teach how WEP works, what different vulnerabilities it has, and how they can be used in practice to break a WEP protected wireless network.
--it depends on the wireless driver used by the card..http://weplab.sourceforge.net/
- Code: Select all
It is very important to configure a wireless interface in monitor mode and in the same channel where the WEP enabled wireless network is. Example: weplab -i wlan0 -c file.cap
Analyze 802.11 captured traffic file: weplab -a file.cap
Crack 802.11 captured traffic file with a brute-force attack: weplab -b file.cap
Crack 802.11 captured traffic file with a dictionary attack: cat dictionary | weplab -y file.cap
Is very useful to join the variability of john the ripper creating different candidate passwords in this kind of attack, for example: john -i -stdout | weplab -y file.cap
Crack 802.11 captured traffic file with a statistical attack (FMS, KoreK attacks): weplab -r file.cap