Description: ARP is the most suitable packet for replaying in encrypted medium. ARP is a fixed size packet so even if encryption is applied, with the help of simple length filters ARP can be found out. Another important criterion for selecting the packet is, for the selected packet someone should respond. ARP passes that criterion as well. Aireplay-NG provides the ARP-replay attack separately. In arpreplay attack you have to apply proper filter options so that the intended ARPs can be filtered properly and aireply will keep on injecting these ARP packets. You should start airodump-NG in the background to capture the ARP responses for cracking the WEP key. <p> Chop-chop attack can decrypt the WEP data packet without knowing the key. This attack cannot reveal the WEP key, but merely find the plaintext. This attack might not be successful on all kinds of APs, as, if AP drops shorter packets than 60 bytes then this attack can fail. In this attack, aireplay keeps on replacing the byte content from 00 to ff and notes the response from the AP. When the AP replays the packet on the wireless side successfully, it freezes that byte and moves on to next byte. For speeding up the process, aireplay-ng replaces the destination address with some multicast address which is a function of the byte content.</p> <p> With the help of Fragmentation attack airelay-ng finds the key stream for the packet. <p> This video explains the arpreplay, chop-chop attack ad fragmentation attack vectors. Along with the demonstration of how to use the attack, this video also talks about the importance of these attacks in cracking the WEP key. </p> AireplayNG is a part of AircrackNG suite of products and is used for re-injecting wireless 802.11 frames on to the specified channel. The main aim of aireplay-NG is to generate large amount of traffic so that it can be used later for cracking the WEP or WPA-PSK keys with the help of aircrack-NG. The input to Aireplay-NG will be either the pcap file which needs to be injected or the interface name, as aireplay-NG is even capable of capturing packets on the wireless interface.Links <p> 1. Aireplay-ng Homepage</p> <p> 2. Aireplay-ng Download</p> <p> 3. Aireplay-ng Linux man page</p>
Tags: tools ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.