2010/9/14 Robin Wood <[email protected]>: > On 14 September 2010 08:53, Bert Van Kets <[email protected]> wrote: >> Hi guys, >> >> I'm giving my first InfoSec presentation on Thursday and wanted to show >> the insecurity of WEP by hacking the key of my own router and then >> showing the traffic of another computer on the wireless network. >> The first part is covered, but I fail getting airtun-ng to run (although >> it ran a couple of days ago). I do a modprobe airtun and then run >> aitun-ng -a [AP mac] -w [wep key] mon0. >> mon0 is created using airmon-ng on my Alfa card. The aitrun-ng command >> tells me the at0 interface is created, but does not return to the >> command prompt. Wireshark or iwconfig do not see the interface. >> >> I'm also trying to get NetworkMiner 0.92 to sniff wep encrypted traffic >> on Windows, but it only lists my own traffic, nothing from other >> machines. I use the WinPCap driver from WireShark. >> >> Anybody got any help/ideas?
You need to have an AirPcap device from CACE Tech to do live WiFi sniffing with NetworkMiner. However, as Robin suggests I recommend sniffing to a pcap file with some other tool. After you've decrypted the WEP traffic I suppose NetworkMiner would be perfect for showing what stuff you've caught while sniffing. /erik >> > > I can't help with the problems but can I suggest you take a canned > pcap file that you know you can crack the WEP key on just in case. > I've done various WEP cracking demos and sometimes you get the key in > seconds and some times sods law kicks in and it takes ages, too long > to have a quiet pause during a demo. > > Robin > _______________________________________________ > Pauldotcom mailing list > [email protected] > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com > _______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
