Help Irongeek.com pay for bandwidth and research equipment:
Man page of WESSIDE-NG
Section: User Commands (1)
Updated: April 2010
Index of this MAN page
Back To MAN Pages From BackTrack 5 R1 Master List
wesside-ng - crack a WEP key of an open network without user intervention
is an auto-magic tool which incorporates a number of techniques to seamlessly obtain a WEP key in minutes. It first identifies a network, then proceeds to associate with it, obtain PRGA (pseudo random generation algorithm) xor data, determine the network IP scheme, reinject ARP requests and finally determine the WEP key. All this is done without your intervention.
Shows the help screen.
- -i <iface>
Wireless interface name. (Mandatory)
- -n <network ip>
Network IP as in 'who has destination IP (netip) tell source IP (myip)'. Defaults to the source IP on the ARP request which is captured and decrypted. (Optional)
- -m <my ip>
'who has destination IP (netip) tell source IP (myip)'. Defaults to the network.123 on the ARP request captured (Optional).
- -a <source mac>
Source MAC address (Optional)
Do not crack the key. Simply capture the packets until control-C is hit to stop the program! (Optional)
- -p <min PRGA>
Determines the minimum number of bytes of PRGA which is gathered. Defaults to 128 bytes. (Optional).
- -v <victim MAC>
Wireless access point MAC address (Optional).
- -t <threshold>
For each number of IVs specified, restart the airecrack-ng PTW engine (Optional). It will restart PTW every <threshold> IVs.
- -f <channel>
Allows the highest channel for scanning to be defined. Defaults to channel 11 (Optional).
This manual page was written by Thomas d'Otreppe.
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU General Public License, Version 2 or any later version published by the Free Software Foundation
On Debian systems, the complete text of the GNU General Public License can be found in /usr/share/common-licenses/GPL.
- SEE ALSO
This document was created by
using the manual pages.
Time: 07:34:21 GMT, September 13, 2011
15 most recent posts on Irongeek.com:
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2019, IronGeek
Louisville / Kentuckiana Information Security Enthusiast