O'Reilly logo

Kali Linux Wireless Penetration Testing Cookbook by Sean-Philip Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Phase six – obtaining the WEP key

Now that we have captured the traffic to a .cap file, we will now try to retrieve the key from the captured packets. To do this we do the following:

Open another new console session and enter:

aircrack-ng -b 00:14:6C:7E:40:80 output*.cap

-b 00:14:6C:7E:40:80 selects the one access point we are interested in.

.cap selects all files starting with output and ending in .cap.

  1. You can run this while generating packets. In a short time, the WEP key will be calculated and presented. You will need approximately 250,000 IVs for 64-bit and 1,500,000 IVs for 128-bit keys. Note that these values are rough guidelines and other variables can impact how much traffic and how many IVs you actually need to collect.
  2. If the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required