Page 2 of 2 FirstFirst 12
Results 11 to 20 of 20

Thread: Wep-psk

  1. #11
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by doggy View Post
    sorry Xploitz but WEP does have PSK (in a way).

    WEP will show PSK in the AUTH colume on the airodump-ng screen, when a client is associating.
    When the client has successfully associated with the AP, the PSK changes to SKA.
    WEP does not have PSK in the true meaning of PSK. The term PSK means (Pre-Shared Key, or "Personal Mode") and ONLY WPA / WPA2 use true PSK's as a means of authentication. Its hard for me to explain, but maybe these quotes from Wikipedia will help??


    Personal WPA utilizes less scalable "pre-shared key" (PSK) mode, where every allowed computer is given the same passphrase. In PSK mode, security depends on the strength and secrecy of the passphrase.
    is designed for home and small office networks that don't require the complexity of an 802.1X authentication server. Each user must enter a passphrase to access the network. The passphrase may be from 8 to 63 printable ASCII characters or 64 hexadecimal digits (256 bits).
    From the aircrack-ng Main site>>>>

    There is another important difference between cracking WPA/WPA2 and WEP. This is the approach used to crack the WPA/WPA2 pre-shared key. Unlike WEP, where statistical methods can be used to speed up the cracking process, only plain brute force techniques can be used against WPA/WPA2. That is, because the key is not static, so collecting IVs like when cracking WEP encryption, does not speed up the attack. The only thing that does give the information to start an attack is the handshake between client and AP. Handshaking is done when the client connects to the network. Although not absolutely true, for the purposes of this tutorial, consider it true. Since the pre-shared key can be from 8 to 63 characters in length, it effectively becomes impossible to crack the pre-shared key.
    The only time you can crack the pre-shared key is if it is a dictionary word or relatively short in length. Conversely, if you want to have an unbreakable wireless network at home, use WPA/WPA2 and a 63 character password composed of random characters including special symbols.
    No matter what I Google I ONLY find info concerning WPA or WPA linked with PSK. and NEVER WEP.

    And the same goes for the aircrack-ng main site. WEP is never mentioned in the same sentence as PSK.

    WEP does however use "Shared Key Authentication" and thats completely different than Pre-Shared Key. The ONLY time you'll see Shared Key Auth is when you get this message while trying to crack WEP......

    Code:
    15:46:53  Sending Authentication Request
     15:46:53  AP rejects open-system authentication
     Please specify a PRGA-file (-y).
    My only clue as to why your airodump-ng is showing PSK with WEP, would be that when your client is connecting to the AP its using a "handshake" similar to a WPA handshake. And then once the client authenticates it says SKA...that means "Shared Key Authentication", which basically means that under shared key authentication, each wireless station is assumed to
    have received a secret shared key over a secure channel that is independent from the 802.11 wireless network communications channel.

    Here, allow me to let Wikipedia explain>>>>


    Two methods of authentication can be used with WEP: Open System authentication and Shared Key authentication.
    For the sake of clarity, we discuss WEP authentication in the Infrastructure mode (ie, between a WLAN client and an Access Point), but the discussion applies to the Ad-Hoc mode too.
    In Open System authentication, the WLAN client need not provide its credentials to the Access Point during authentication. Thus, any client, regardless of its WEP keys, can authenticate itself with the Access Point and then attempt to associate. In effect, no authentication (in the true sense of the term) occurs. After the authentication and association, WEP can be used for encrypting the data frames. At this point, the client needs to have the right keys.


    In Shared Key authentication, WEP is used for authentication. A four-way challenge-response handshake is used:
    I) The client station sends an authentication request to the Access Point.
    II) The Access Point sends back a clear-text challenge.
    III) The client has to encrypt the challenge text using the configured WEP key, and send it back in another authentication request.
    IV) The Access Point decrypts the material, and compares it with the clear-text it had sent. Depending on the success of this comparison, the Access Point sends back a positive or negative response. After the authentication and association, WEP can be used for encrypting the data frames.
    At first glance, it might seem as though Shared Key authentication is more secure than Open System authentication, since the latter offers no real authentication. However, it is quite the reverse. It is possible to derive the static WEP key by capturing the four handshake frames in Shared Key authentication.[1] Hence, it is advisable to use Open System authentication for WEP authentication, rather than Shared Key authentication. (Note that both authentication mechanisms are weak).
    Please doggy, do NOT take what I said as a "dig" at you. I only wish to educate you and the others about the true meaning of PSK and how its a SPECIFIC WPA / WPA2 authentication, and not intended to be confused with WEP which uses "Shared Key Authentication.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  2. #12

    Default

    Quote Originally Posted by doggy View Post
    sorry Xploitz but WEP does have PSK (in a way).

    WEP will show PSK in the AUTH colume on the airodump-ng screen, when a client is associating.
    When the client has successfully associated with the AP, the PSK changes to SKA.
    I agree with -=Xploitz=-, I looked into this today & the only thing I found even close to it was Alice & Bob

  3. #13
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by samsung View Post
    I agree with -=Xploitz=-, I looked into this today & the only thing I found even close to it was Alice & Bob
    I loved the 11th commandmandment....

    Thou shall not encrypt 2 plaintexts with the same key.

    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  4. #14
    Junior Member
    Join Date
    Apr 2007
    Posts
    25

    Default

    Taken from aircrack-ng Tutorial: How to do shared key fake authentication ?

    Beyond the error message shown in the introduction, how do you determine if shared key authentication is required? In the screen below, notice the “SKA” for the AP under AUTH. This means it is using shared key authentication. This will not show up until a client has successfully associated with the AP.

    CH 9 ][ Elapsed: 20 s ][ 2007-02-10 16:29

    BSSID PWR RXQ Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID

    00:14:6C:7E:40:80 37 100 197 9 0 9 11 WEP WEP SKA teddy

    BSSID STATION PWR Lost Packets Probes

    00:14:6C:7E:40:80 00:0F:B5:34:30:30 61 0 7

    Once “PSK” appears on the airodump-ng screen, do file listing and it will look something like:

    sharedkey-01-00-14-6C-7E-40-80.xor sharedkey-01.cap sharedkey-01.txt The “sharedkey-01-00-14-6C-7E-40-80.xor” file contains the PRGA xor bits that can be used in a later step to successfully complete the fake authentication.

    i know the PSK for WEB is not the same as for WPA / WPA2, but WEB does have PSK when a client is associating with a AP.

  5. #15
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by doggy View Post

    i know the PSK for WEB is not the same as for WPA / WPA2, but WEB does have PSK when a client is associating with a AP.
    Under Windows, WEP settings (when setting your WEP key) does have something called "passphrase"...but no matter what you set this "so called passphrase" to..it will ultimately be broken down into simple basic hexadecimal format, which is what aircrack normally uses when cracking the WEP key.

    But again, this PSK your seeing is not a true "Pre-Shared key"...its just something airodump is using to identify and for you differentiate between when the client is authenticated or not with a type of "Shared Key Authentication". I can't really explain it any better. Perhaps the aircrack-ng team can help explain this??

    I understand what your saying doggy, but just because your WEP is set to "Shared-key Authentication" doesn't necessarily mean its using a true "Pre-Shared Key" or passphrase. ONLY WPA /WPA2 use true PASSPHRASES and PSK's. The PSK or passphrase is literally fused with the ESSID of your WPA / WPA2 network..and its algorithms will be completely unique to your AP.

    For example:

    You can't use the same IP tables that you have pre-salted for your WPA / WPA2 network named "doggy's network" with the passphrase "password" on another WPA / WPA2 protected network with a different ESSID and use those tables to crack it.

    Maybe I'm just rambling and wasting my breath, but I feel compelled to help you understand what PSK really means / is.

    One last thing.....from aicrack-ng main site, (about airodump) taken from here>>

    AUTH: The authentication protocol used. One of MGT (WPA/WPA2 using a separate authentication server), SKA (shared key for WEP), PSK (pre-shared key for WPA/WPA2), or OPN (open for WEP).
    As you can see, it clearly states that the PSK authentication is for WPA / WPA2...not WEP.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  6. #16
    Junior Member
    Join Date
    Apr 2007
    Posts
    25

    Unhappy

    Sir i did some further reading on the subject, and found out that i had made a mistake. WEP will show PSK in the CIPHER and not in the AUTH as stated in a earlier post by me . When a client is associated the CIPHER field goes from blank to “PSK”.colume on the airodump-ng screen.

    Sir you are right, WEB does not have PSK.

  7. #17
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by doggy View Post
    Sir i did some further reading on the subject, and found out that i had made a mistake. WEP will show PSK in the CIPHER and not in the AUTH as stated in a earlier post by me . When a client is associated the CIPHER field goes from blank to “PSK”.colume on the airodump-ng screen.

    Sir you are right, WEB does not have PSK.
    No need to be ashamed little brother. We all make mistakes...even me. And thank you for coming back to post your results. I know how hard it is to swallow your own pride and admit that you were wrong..... And I respect that of you.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  8. #18
    Just burned his ISO
    Join Date
    Sep 2008
    Posts
    5

    Default

    I was just wonder as I ran into this problem earlier trying to crack my connection how do u fake the shared key authentication on a WEP connection anyone have a tutorial or know of a site that could help me out with this.

    Thanx in advance

  9. #19
    Senior Member
    Join Date
    Apr 2008
    Posts
    2,008

    Default

    Quote Originally Posted by Torax View Post
    I was just wonder as I ran into this problem earlier trying to crack my connection how do u fake the shared key authentication on a WEP connection anyone have a tutorial or know of a site that could help me out with this.

    Thanx in advance
    Check out the tutorial at aircrack.ng:
    http://www.aircrack-ng.org/doku.php?...authentication
    -Monkeys are like nature's humans.

  10. #20
    Just burned his ISO
    Join Date
    Sep 2008
    Posts
    5

    Default

    Thanx for the link *Edit* figured it out for some reason the first time I tried the method didn't work but i tried it again and it worked this time, but still thanx for the help

Page 2 of 2 FirstFirst 12

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •