📄 manual.html
字号:
<span style="font-family: monospace;"> server mode and port it's thenumber port where the server is</span><br style="font-family: monospace;"><span style="font-family: monospace;"> listening</span><br style="font-family: monospace;"><br style="font-family: monospace;"><span style="font-family: monospace;"> -n network</span><br style="font-family: monospace;"><span style="font-family: monospace;"> Network is a number andspecifies the maximum number of keys to</span><br style="font-family: monospace;"><span style="font-family: monospace;"> decrypt by default wepdecryptwill try to decrypt all packets</span><br style="font-family: monospace;"><span style="font-family: monospace;"> with diferent keys found<br><br>-d mode<br>Mode can be all, alpha, alphanumeric, numeric, random or print-<br>able this option is used to set the mode for the new key genera-<br>tor. For example "-m 64 -d numeric" will try keys from"00000"<br>to "99999"<br style="font-family: monospace;"></span><br style="font-family: monospace;"><span style="font-family: monospace;"> -g Used with client mode to getthe file to decrypt from the server</span><br style="font-family: monospace;"><br style="font-family: monospace;"><span style="font-family: monospace;"> -l num_blocks</span><br style="font-family: monospace;"><span style="font-family: monospace;"> Used with client mode to set thenumber blocks to decrypt if</span><br style="font-family: monospace;"><span style="font-family: monospace;"> num_blocks is 0 the client willdecrypt blocks while server has</span><br style="font-family: monospace;"><span style="font-family: monospace;"> blocks to assign</span><br style="font-family: monospace;"><br style="font-family: monospace;"><span style="font-family: monospace;"> -v Shows current version</span><br style="font-family: monospace;"><br style="font-family: monospace;"><span style="font-family: monospace;"> -?|-h Shows help menu</span><br style="font-family: monospace;"></div><br style="font-family: monospace;"><span style="font-family: monospace;"> As a first approach I suggestyou to use wepdecrypt_inc script or a </span><br style="font-family: monospace;"><span style="font-family: monospace;"> dicctionary to try common usedkeys.</span><br style="font-family: monospace;"><div style="margin-left: 40px; font-style: italic;"><span style="font-family: monospace;"> wepdecrypt_inc dumpfile</span><br style="font-family: monospace;"><span style="font-family: monospace;"> wepdecrypt -f dumpfile -wdictionary_file</span><br style="font-family: monospace;"></div><br style="font-family: monospace;"><span style="font-family: monospace;"> Now lets going to see some othermethods:</span><br style="font-family: monospace;"><div style="margin-left: 40px;"><span style="font-family: monospace; font-style: italic;"> wepdecrypt -fdumpfile -m64 -i 00:00:00:00:00 -e FF:FF:FF:FF:FF:FF </span><br style="font-family: monospace; font-style: italic;"><span style="font-family: monospace;"><span style="font-style: italic;">wepdecrypt -f dumpfile -m128 -i 11:22:33:44:55:66:77:88:99:0A:0B:0C:0D<br>wepdecrtpt -f dumpfile -m64 -d alpha<br>wepdecrtpt -f dumpfile -m128 -d all<br style="font-style: italic;"></span><br style="font-family: monospace;"></span></div><span style="font-family: monospace;"> This uses the internal keygenerator to try all specified keys, you can </span><br style="font-family: monospace;"><span style="font-family: monospace;"> stop wepdecrypt at any time andresume the session later. Take a look at </span><br style="font-family: monospace;"><span style="font-family: monospace;"> the logfile and use the last keyas init key to continue the cracking </span><br style="font-family: monospace;"><span style="font-family: monospace;"> session. If init key is notspecified 00:..:00 will be used and if last key </span><br style="font-family: monospace;"><span style="font-family: monospace;"> is not specified FF:..:FF willbe used.</span><br style="font-family: monospace;"><br style="font-family: monospace;"><span style="font-family: monospace;"> At last the most powerful modethe distributed network attack, first of all </span><br style="font-family: monospace;"><span style="font-family: monospace;"> start wepdecrypt in server mode</span><br style="font-family: monospace;"><div style="margin-left: 40px;"><span style="font-family: monospace; font-style: italic;"> wepdecrypt -s -flocal.dump -m 64&</span><br style="font-family: monospace;"></div><br style="font-family: monospace;"><span style="font-family: monospace;"> In server mode also init key canbe specified with -i</span><br style="font-family: monospace;"><span style="font-family: monospace;"> flag.</span><br style="font-family: monospace;"><br style="font-family: monospace;"><span style="font-family: monospace;"> Now execute wepdecrypt as aclient. First get the dumpfile from the server</span><br style="font-family: monospace;"><span style="font-family: monospace;"> and start wepdecrypt in clientmode</span><br style="font-family: monospace;"><div style="margin-left: 40px;"><span style="font-family: monospace; font-style: italic;"> wepdecrypt -cexample.com:3657 -g </span><br style="font-family: monospace;"><span style="font-family: monospace;"> (ip number can be used insteadhostname)</span><br style="font-family: monospace;"><span style="font-family: monospace; font-style: italic;"> wepdecrypt-c example.com:3657 -l 0</span><br style="font-family: monospace;"></div><br style="font-family: monospace;"><span style="font-family: monospace;"> Short explanation about packetfilters:</span><br style="font-family: monospace;"><span style="font-family: monospace;"> -b flag deserves to select an ap(the mac of the ap must be used to select it)</span><br style="font-family: monospace;"><span style="font-family: monospace;"> -n flag deserves to select thenumber of packets this is independent from -b <br><br>Now wordfile can contain hex keys which will be used as keys. To use<br>this feature the first line of the word file should be HEXKEY_FILE.</span><br style="font-family: monospace;"></div><div style="margin-left: 40px;"><br style="font-family: monospace;"><big><span style="font-family: monospace;"><a name="5._Config_files."></a>5.Config files.</span></big><br style="font-family: monospace;"></div><div style="margin-left: 80px;"><span style="font-family: monospace; font-style: italic;"> $HOME/.wepdecrypt</span><br style="font-family: monospace; font-style: italic;"><span style="font-family: monospace; font-style: italic;"> #Wepdecryptconfiguration file</span><br style="font-family: monospace; font-style: italic;"><span style="font-family: monospace; font-style: italic;"> #Serverlistening port</span><br style="font-family: monospace; font-style: italic;"><span style="font-family: monospace; font-style: italic;"> Port=3617</span><br style="font-family: monospace; font-style: italic;"><br style="font-family: monospace; font-style: italic;"><span style="font-family: monospace; font-style: italic;"> #Blocksizecan be set up to 1099511627775</span><br style="font-family: monospace; font-style: italic;"><span style="font-family: monospace; font-style: italic;">Blocksize=4294967296 (01:00:00:00:00)</span><br style="font-family: monospace; font-style: italic;"><br style="font-family: monospace; font-style: italic;"><span style="font-family: monospace; font-style: italic;"> #Full pathto server logfile</span><br style="font-family: monospace; font-style: italic;"><span style="font-family: monospace; font-style: italic;">Logfile=/var/tmp/wepdecrypt_s.log</span><br style="font-family: monospace; font-style: italic;"><br style="font-family: monospace; font-style: italic;"><span style="font-family: monospace; font-style: italic;"> #Verbositylevels: 1 - LOW 2 - MEDIUM 3 - HIGH</span><br style="font-family: monospace; font-style: italic;"><span style="font-family: monospace; font-style: italic;"> Verbosity=2</span><br style="font-family: monospace; font-style: italic;"><br style="font-family: monospace; font-style: italic;"><span style="font-family: monospace;"> I think that this is selfexplanatory it handles server configuration all </span><br style="font-family: monospace;"><span style="font-family: monospace;"> datafields must be in the file.</span><br style="font-family: monospace; font-style: italic;"><br style="font-family: monospace; font-style: italic;"><span style="font-family: monospace; font-style: italic;">/etc/wedecrypt.conf</span><br style="font-family: monospace; font-style: italic;"><span style="font-family: monospace; font-style: italic;"> #/etc/wedecrypt.conf</span><br style="font-family: monospace; font-style: italic;"><span style="font-family: monospace; font-style: italic;"> #</span><br style="font-family: monospace; font-style: italic;"><span style="font-family: monospace; font-style: italic;"> #Configuration for WEPDECRYPT</span><br style="font-family: monospace; font-style: italic;"><span style="font-family: monospace; font-style: italic;"> # FernandoTarin</span><br style="font-family: monospace; font-style: italic;"><br style="font-family: monospace; font-style: italic;"><span style="font-family: monospace; font-style: italic;">JOHNDIR=/usr/sbin/ (usual place)</span><br style="font-family: monospace; font-style: italic;"><span style="font-family: monospace; font-style: italic;">WORDLIST=/usr/src/john-1.6/run/wordlist</span><br style="font-family: monospace;"><br style="font-family: monospace;"><span style="font-family: monospace;"> This is used for wepdecrypt_incand wepdecrypt_word which uses john the </span><br style="font-family: monospace;"><span style="font-family: monospace;"> ripper to generate keys<br><br>In the windows version all files should be in the same directory as <br>wepdecrypt.<br style="font-family: monospace;"></span></div><div style="margin-left: 40px;"><br><big><span style="font-family: monospace;"><a name="6._Graphic_interface."></a></span></big><big><span style="font-family: monospace;">6. Graphic interface.<br></span></big><div style="margin-left: 40px; text-align: justify;"><span style="font-family: monospace;"><span style="font-style: italic;"></span>This is the graphic interface for wepdecrypt. The gui is prettyself<br>explanatory, every input box has a flag name, just change it with your<br>desired values and hit the check button next to the input box,besides<br>now, there is a new help option in the help menu (can also be accessed<br>pressing "Ctrl+h") that explains every option. To start wepdecrypt<br>press the start button. The default directory for wepdecrypt output<br>logs is /tmp/ (in windows version is the same directory in which<br>gwepdecrypt is running) it can be changed through the gui or<br>$HOME/.wepdecrypt file.<br><br></span></div><big><span style="font-family: monospace;"><a name="7._Wkeygen."></a></span></big><big><span style="font-family: monospace;">7. Wkeygen.<br></span></big><div style="margin-left: 40px; text-align: justify;"><span style="font-family: monospace;"><span style="font-style: italic;"></span>Wkeygenis a tool that generates WEP keys. Provided to allow the creation<br>of wordfiles that contains hex keys easily. Usage is pretty simple justuse<br>-? flag to see its options (linux version only).</span><br></div><br style="font-family: monospace;"><big><span style="font-family: monospace;"><a name="8._How_to_help_the_project."></a>8. How to help the project.</span></big><br style="font-family: monospace;"></div><div style="margin-left: 80px;"><span style="font-family: monospace;">Well to help me with the project anything is wellcome.</span><br style="font-family: monospace;"><span style="font-family: monospace;"> - a patch</span><br style="font-family: monospace;"><span style="font-family: monospace;"> - rpm or deb versions ofwepdecrypt</span><br style="font-family: monospace;"><span style="font-family: monospace;"> - reporting a bug</span><br style="font-family: monospace;"><span style="font-family: monospace;"></span><br style="font-family: monospace;"><span style="font-family: monospace;"> If you have any suggestion aquestion or something like this.</span><br style="font-family: monospace;"><a href="http://wepdecrypt.sourceforge.net/forum/"><span style="font-family: monospace;">http://wepdecrypt.sourceforge.net/forum/</span></a><br style="font-family: monospace;"><a href="mailto:icemanf@gmail.com"><span style="font-family: monospace;">icemanf@gmail.com</span></a><br></div></div></body></html>
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -