WEP cracking

Hello Hackers, How are u?, ... In this article i am going to be talking about WEP cracking.  

so lets get started:

 before going to hack into wep we should first know about wep  and how it works:

what is WEP:

Wired Equivalent Privacy (WEP) is considered as a form of security protocol that was designed in order to provide a level of security and privacy to a wireless local area network (WLAN) comparable to what is normally expected of a wired local area network.[1] Since a wireless network can transmit data all over an area through radio waves, this data can easily be intercepted through wireless data transmissions. Other users may even be able to eavesdrop on private and confidential conversations made through wireless networks without this form of security. Thus, WEP adds security to a wireless network by encrypting this data. Once data is intercepted, it will become unrecognizable to the system because it has already been encrypted. However, systems that are authorized on the network will be able to recognize and decrypt the data. This is because devices on the network make use of the same encryption algorithm. Thus, the main goal of WEP is to provide security to wireless networks.

cracking WPA:

i just divided cracking WPA2 in the following main part, so Guys pls go and do watch all this videos, u will be able to Crack WPA/WPA2.

THEORY BEHIND CRACKING WPA:

   https://drive.google.com/file/d/1zHD7gzR5IB4nEJDIl8ZCXVqdXuO_zaQp/view?usp=sharing

 BASIC CASE:

https://drive.google.com/file/d/1AB1T4P9Qnc1pXMMFnut23vLNjQqmbmcv/view?usp=sharing 

 FAKE AUTHINTICATION ATTACK:

https://drive.google.com/file/d/1Z-5cQD1Mw5SPJIiKHojLPvkDIPKOeAat/view?usp=sharing

ARP REQUEST REPLY ATTACK:

https://drive.google.com/file/d/1rNnA0-TvhjbyNf6fByGjHPLB4ZHSH8YT/view?usp=sharing

 That's all for today guys hope you are enjoying our content and also guys Pls don't forget to follow us on Instagram and GitHub and do like our content on Instagram.

https://instagram.com/__pytools__

https://GitHub.com/pytools786

 

Comments

Popular posts from this blog

what is log4j vulnerability

Secure your system from Pegasus spyware

Pegasus spyware