xref: /freebsd/tools/tools/net80211/wesside/README (revision f126890a)
1
2This is an implementation of the frag attack described in:
3http://tapir.cs.ucl.ac.uk/bittau-wep.pdf
4It will only work with Atheros.  It could be made to work with other cards, but
5it is more difficult.
6
7wesside's features:
8===================
9* Channel hops, finds a WEP wifi, finds a MAC to spoof if necessary and
10  associates.
11* Waits for a packet.  Uses fragmentation to recover some keystream.
12* Discovers the network's IP using the linear keystream expansion technique in
13  order to decrypt an ARP packet.
14* Generates traffic on the network for weak IV attack:
15  - Either by flooding with ARP requests.
16  - Or, by contacting someone on the Internet [udps] and telling it to flood.
17* Uses aircrack periodically to attempt to crack the WEP key.  The supplied
18  aircrack is modified to work with wesside.
19* Binds to a tap interface to allow TX.  RX works if a dictionary is being built
20  [dics] and a packet with a known IV traverses the network.
21
22Examples:
23=========
24For the skiddies:
25./wesside
26
27To cause the Internet to flood:
28[Internet box]~$ ./udps 500
29./wesside -s ip_of_internet_box
30
31To build a dictionary:
32[Internet box]~# ./dics source_ip_of_box 100
33./wesside -s ip_of_internet_box
34Use tap3 as if it were the wifi.
35