Manual
Manual
Manual
===============================================
1. What is wepdecrypt.
2. What you need to install wepdecrypt.
3. Short explanation about dumpfiles.
4. Wepdecrypt usage.
5. Config files.
6. Graphic interface
7. How to help the project.
===============================================
1. What is wepdecrypt.
Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based
on a active dictionary attack, key generator, distributed network attack
and some other methods, it's based on wepattack and GPL licensed
Libz comes with almost every distro so you have to worry to install the two
others, besides that in some distros you also have to install package
headers (usually -dev packages).
(and as root)
make install
Installing john the ripper is also highly recommended but it's not
mandatory. Wepdecrypt will only work in little endian linux enviroments
don't try in others actually x86 and mips archs have been successfuly
tested.
4. Wepdecrypt usage.
At this stage you should have wepdecrypt installed and a fresh dumpfile
available in your system so it's the time to show wepdecrypt in action.
-w wordfile
Take keys from a file to perform a dicctionary attack (not valid
with 64 or 128 mode)
-b mac_address
Filter an address from the dump file this is done to decrypt
only the keys from one access point (referenced by mac), if the
provided ap mac isn't found the program will try to decrypt all
networks found in dumpfile
-m mode
Specifies the decrypting mode (default all) values: 64, 128,
n64, n128, nall
-i Key This option is for the internal key generator (used with 64 or
128 mode) it specifies the start key
-e Key This option is for the internal key generator (used with 64 or
128 mode) it specifies the last key
-c server:port
Client mode, server is the host where wepdecrypt is running in
server mode and port it's the number port where the server is
listening
-n network
Network is a number and specifies the maximum number of keys to
decrypt by default wepdecrypt will try to decrypt all packets
with diferent keys found
-d mode
Mode can be all, alpha, alphanumeric, numeric, random or print-
able this option is used to set the mode for the new key genera-
tor. For example "-m 64 -d numeric" will try keys from "00000"
to "99999"
-g Used with client mode to get the file to decrypt from the server
-l num_blocks
Used with client mode to set the number blocks to decrypt if
num_blocks is 0 the client will decrypt blocks while server has
blocks to assign
This uses the internal key generator to try all specified keys, you can
stop wepdecrypt at any time and resume the session later. Take a look at
the logfile and use the last key as init key to continue the cracking
session. If init key is not specified 00:..:00 will be used and if last key
is not specified FF:..:FF will be used.
At last the most powerful mode the distributed network attack, first of all
start wepdecrypt in server mode
wepdecrypt -s -f local.dump -m 64&
Now execute wepdecrypt as a client. First get the dumpfile from the server
and start wepdecrypt in client mode
wepdecrypt -c example.com:3657 -g
(ip number can be used instead hostname)
wepdecrypt -c example.com:3657 -l 0
Now wordfile can contain hex keys which will be used as keys. To use
this feature the first line of the word file should be HEXKEY_FILE.
5. Config files.
$HOME/.wepdecrypt
#Wepdecrypt configuration file
#Server listening port
Port=3617
/etc/wedecrypt.conf
# /etc/wedecrypt.conf
#
# Configuration for WEPDECRYPT
# Fernando Tarin
This is used for wepdecrypt_inc and wepdecrypt_word which uses john the
ripper to generate keys.
6. Graphic interface
This is the graphic interface for wepdecrypt. The gui is pretty self
explanatory, every input box has a flag name, just change it with your
desired values and hit the check button next to the input box, besides
now, there is a new help option in the help menu (can also be accessed
pressing "Ctrl+h") that explains every option. To start wepdecrypt
press the start button. The default directory for wepdecrypt output
logs is /tmp/ (in windows version is the same directory in which
gwepdecrypt is running) it can be changed through the gui or
$HOME/.wepdecrypt file.
7. Wkeygen
Wkeygen is a tool that generates WEP keys. Provided to allow the creation
of wordfiles that contains hex keys easily. Usage is pretty simple just use
-? flag to see its options (linux version only).