Ask HN: How does WEP cracking work?
27 points| DaemonXI | 15 years ago
I understand the basic principles: * find interface and AP info * dump all packets sniffed from target AP * run fake authentication attack * use ARP request replay to generate IVs for cracking * crack collected packets once you have enough
I understand HOW to do it, but not how it works. I don't understand why I have to do a fake authentication attack, or what kind of packets aireplay-ng -3 generates and why they're useful, or how the crack itself works at the end.
Can anyone shed a little light on the process? The pages I've found only detail how to do it, not why they work, and the Wiki pages I've found are too in-depth to be grokable.
[+] [-] Saavedro|15 years ago|reply
The initial arrangement of this array is derived from the key, by what is called a Key Scheduling Algorithm. In certain cases, this key scheduling algorithm can be worked backwards from the output of RC4 (the pseudorandom data) (if you can figure out enough about what the state of the array is) to get the key.
It is not secure to use the same key twice when doing symmetric crypto, so an Initialization Vector (just some extra data that is different for each message) is usually combined with the "key" to create a new key for each message. The IV is not a secret and usually sent along with the message in plaintext since you have to know the rest of the key anyway. However, in RC4, certain IVs cause working the Key Scheduling Algorithm backwards to be much easier.
All of the fake-auth attacks, deauths, and whatnot that aircrack does are for forcing machines on the network to generate more packets, because that increases the chance a packet will have a "weak" IV.
http://en.wikipedia.org/wiki/Fluhrer,_Mantin_and_Shamir_atta...
[+] [-] ErrantX|15 years ago|reply
The idea is that you can use weak IV's (as described above) to attack the subsequent bytes in the encryption key. The important thing to know is that the next byte cannot be definitively calculated - you can only calculate a possible value. The reason a lot of weak IV's is needed is so you can perform the same attack multiple times - at which point the correct byte value will appear much more often than any other value.
(incidentally; the theory behind it is actually pretty simple but you do have to be up on your encryption terminology for it to make sense on first reading :) when I learned all this from scratch it took me ages to get my head round it)
[+] [-] mertenz|15 years ago|reply
Hope that helps
[+] [-] jc-denton|15 years ago|reply
[+] [-] jordyhoyt|15 years ago|reply
[+] [-] younata|15 years ago|reply
[+] [-] js4all|15 years ago|reply
[+] [-] Concours|15 years ago|reply
[+] [-] blasdel|15 years ago|reply
ESR's edicts on nomenclature hold no sway over this community, nor really any other. His attempt to parlay any negative implications onto the word 'cracker' have only ever been taken seriously by affected noobs.