AirSnort is a handy wireless LAN (WLAN) tool that helps you recover encryption keys. It works by quietly monitoring data transmissions and can figure out the encryption key once it has gathered enough packets.
The 802.11b standard, which uses the Wired Equivalent Protocol (WEP), has a lot of security issues. One major problem is highlighted in the paper "Weaknesses in the Key Scheduling Algorithm of RC4" by Scott Fluhrer, Itsik Mantin, and Adi Shamir.
Adam Stubblefield was the first to put this attack into action, but he didn't release his software to the public. Luckily, AirSnort, along with another tool called WEPCrack, was made available around the same time.
AirSnort needs to gather about 5-10 million encrypted packets. Once it has enough data, it can guess the encryption password in less than a second!
You can run AirSnort on either Windows or Linux. Just make sure your wireless network interface card (NIC) can do RF monitor mode and pass monitor mode packets through the PF_PACKET interface. Here are some cards that work well:
If you're using Linux, check out Kismet's site for help finding out if your card supports monitor mode and what drivers you'll need.
If you want to compile AirSnort, here's what you need to do:
You also need to install the LATEST version of libpcap and make sure any old versions are removed (this isn't required for Windows users).
Your system should have gtk+-2.2 installed since AirSnort uses a GUI application. You'll also need gtk+-devel.
This will get you set
Go to the Softpas website, press the 'Downloads' button, and pick the app you want to download and install—easy and fast!
SoftPas is your platform for the latest software and technology news, reviews, and guides. Stay up to date with cutting-edge trends in tech and software development.
Subscribe to newsletter
© Copyright 2024, SoftPas, All Rights Reserved.