Description: Many times while cracking the WEP key, you need to associate your client with the AP, so that AP will accept your packets. In those situations Fake-Authentication attack will be a handy tool. Fake authentication attack actually exchanges the connection handshake packets like probe request and response, Authentication request and response and association packets to establish the authentication. It also keeps on sending keep-alive packets after some time interval so that the association in AP remains persistent. <p> After your machine or some other actual client gets associated with the access point, re-injection attack can be launched. The simplest re-injection mode will be select the packet on wireless side with some filters and then re-inject those packets. Here we can select the packet in such a way so that the replay for the packet will be generated and ots of new packets will start flowing in the medium. This attack is called as interactive frame selection attack. </p> <p> This video explains the fake authentication and interactive frame selection attack. Along with the demonstration of how to use the attack, this video also talks about the importance of these attacks in cracking the WEP key. </p>AireplayNG is a part of AircrackNG suite of products and is used for re-injecting wireless 802.11 frames on to the specified channel. The main aim of aireplay-NG is to generate large amount of traffic so that it can be used later for cracking the WEP or WPA-PSK keys with the help of aircrack-NG. The input to Aireplay-NG will be either the pcap file which needs to be injected or the interface name, as aireplay-NG is even capable of capturing packets on the wireless interface.Links <p> 1. Aireplay-ng Homepage</p> <p> 2. Aireplay-ng Download</p> <p> 3. Aireplay-ng Linux man page</p>
Tags: tools ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.