Comprehensive Guide: Hacking WPA Networks with Gerix Wi-Fi Cracker

Verified

Added on  2023/04/22

|6
|545
|224
Practical Assignment
AI Summary
This assignment provides a step-by-step guide on how to hack WPA networks using the Gerix Wi-Fi cracker on a Backtrack operating system. It details the process from enabling monitor mode and sniffing packets to performing WEP attacks and cracking the WEP key. The guide emphasizes the importance of packet injection vulnerability in WPA networks and provides practical instructions for exploiting these vulnerabilities using tools available in Backtrack. It also includes references to research papers that discuss the vulnerabilities in WPA networks and key exchange schemes.
Document Page
1Running Head: HACKING WPA NETWORKS USING GERIX
Hacking WPA Networks Using Gerix
Institution
Date
Name
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2Running Head: HACKING WPA NETWORKS USING GERIX
WPA networks have a vulnerability for packet injection. We are performing a test
using Gerix WI-Fi cracker on a live backrack operating system run from a bootable
USB flash drive.
Once the computer is on, the first step is to open the Backtrack applications
menu, Backtrack - > Exploitation instruments - > Wireless exploitation - > WLAN
Exploitation after which we find gerix-Wi-Fi-saltine ng. clicking on this will pop up a
graphical interface which we will utilize as shown below (Noh, Kim, Kwon, & Cho,
2016).
Go to the menu for configuration and choose the interface wlan0 then
Enable/Disable Monitor Mode to enable the monitor mode from managed mode. Now
Select the recently made mon0 interface.
Document Page
3Running Head: HACKING WPA NETWORKS USING GERIX
Next tap on the WEP tab at the highest point of the window and then choose
"start sniffing and logging" and leave the terminal open (Ismukhamedova, Satimova,
Nikiforov, & Miloslavskaya, 2016). Once the wifi network we need to crack appears
we should select the WEP Attacks (with clients). The PWR number must be
sufficiently high to work so the closer we can get, the better.When the value is high,
tap on "Associate with AP using fake auth" then wait a couple of moments and tap on
"ARP ask for replay" (Sarkar, 2015).
Document Page
4Running Head: HACKING WPA NETWORKS USING GERIX
As soon as the Data number reaches more than 10,000 we are prepared to attempt
(if the information is coming quick hold up until 20 or 30,000 to be secure) and crack
the key, however we should not close any windows yet.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5Running Head: HACKING WPA NETWORKS USING GERIX
Tap the cracking tab and go to "Aircrack-ng – Decrypt WEP secret key" under
Wep Cracking.
In a couple of minutes secret phrase will be cracked. Key found.
Document Page
6Running Head: HACKING WPA NETWORKS USING GERIX
References
Sarkar, S. (2015, April). Dependence in IV-Related Bytes of RC4 Key Enhances
Vulnerabilities in WPA. In Fast Software Encryption: 21st International
Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected
Papers (Vol. 8540, p. 350). Springer.
Noh, J., Kim, J., Kwon, G., & Cho, S. (2016, October). Secure key exchange scheme
for WPA/WPA2-PSK using public key cryptography. In Consumer Electronics-
Asia (ICCE-Asia), IEEE International Conference on (pp. 1-4). IEEE.
Ismukhamedova, A., Satimova, Y., Nikiforov, A., & Miloslavskaya, N. (2016, July).
Practical studying of Wi-Fi network vulnerabilities. In Digital Information
Processing, Data Mining, and Wireless Communications (DIPDMWC), 2016
Third International Conference on (pp. 227-232). IEEE.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]