|WESSIDE-NG(8)||System Manager's Manual||WESSIDE-NG(8)|
wesside-ng - crack a WEP key of an open network without user intervention
wesside-ng is an auto-magic tool which incorporates a number of techniques to seamlessly obtain a WEP key in minutes. It first identifies a network, then proceeds to associate with it, obtain PRGA (pseudo random generation algorithm) xor data, determine the network IP scheme, reinject ARP requests and finally determine the WEP key. All this is done without your intervention.
- Shows the help screen.
- -i <iface>
- Wireless interface name. (Mandatory)
- -n <network ip>
- Network IP as in 'who has destination IP (netip) tell source IP (myip)'. Defaults to the source IP on the ARP request which is captured and decrypted. (Optional)
- -m <my ip>
- 'who has destination IP (netip) tell source IP (myip)'. Defaults to the network.123 on the ARP request captured (Optional).
- -a <source mac>
- Source MAC address (Optional)
- Do not crack the key. Simply capture the packets until control-C is hit to stop the program! (Optional)
- -p <min PRGA>
- Determines the minimum number of bytes of PRGA which is gathered. Defaults to 128 bytes. (Optional).
- -v <victim MAC>
- Wireless access point MAC address (Optional).
- -t <threshold>
- For each number of IVs specified, restart the airecrack-ng PTW engine (Optional). It will restart PTW every <threshold> IVs.
- -f <channel>
- Allows the highest channel for scanning to be defined. Defaults to channel 11 (Optional).
This manual page was written by Thomas d'Otreppe. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU General Public License, Version 2 or any later version published by the Free Software Foundation On Debian systems, the complete text of the GNU General Public License can be found in /usr/share/common-licenses/GPL.
|January 2020||Version 1.6.0|