oasis6 PWNED


Let me record the steps here so that I won’t forget in the near future. This is my second try after the first try where Ser Yoong logged into the wifi and let me used his MAC Address to spam ARP replay packets and manage to get the IVs flowing like water. This time managed to do it without any clients, and partly referred to Corelan.be, very useful.

  1. Airmon-ng the interface, turn on the monitor mode.
  2. Airodump-ng with the mon0 argument to get all the access points MAC and channel, choose one (WEP)
  3. Airodump-ng again with –channel and –bssid set
  4. Aireplay-ng –test (test injection)
  5. Aireplay-ng replay ARP, -5 using the -h fake associated hosts MAC
  6. Do fake authentication with Aireplay-ng
  7. Flowing incoming ivs
  8. ???
  9. Profit

This time it took 30k ivs to be able to crack the WEP password.

oasis6 pwned*click to enlarge*



2 Responses to “oasis6 PWNED”

  1. singdreams Says:

    can u post the tutorial to hack WPA2 WPA keys?

    WEP is way too easy to crack : D

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: