1 2This is an implementation of the frag attack described in: 3http://tapir.cs.ucl.ac.uk/bittau-wep.pdf 4It will only work with Atheros. It could be made to work with other cards, but 5it is more difficult. 6 7wesside's features: 8=================== 9* Channel hops, finds a WEP wifi, finds a MAC to spoof if necessary and 10 associates. 11* Waits for a packet. Uses fragmentation to recover some keystream. 12* Discovers the network's IP using the linear keystream expansion technique in 13 order to decrypt an ARP packet. 14* Generates traffic on the network for weak IV attack: 15 - Either by flooding with ARP requests. 16 - Or, by contacting someone on the Internet [udps] and telling it to flood. 17* Uses aircrack periodically to attempt to crack the WEP key. The supplied 18 aircrack is modified to work with wesside. 19* Binds to a tap interface to allow TX. RX works if a dictionary is being built 20 [dics] and a packet with a known IV traverses the network. 21 22Examples: 23========= 24For the skiddies: 25./wesside 26 27To cause the Internet to flood: 28[Internet box]~$ ./udps 500 29./wesside -s ip_of_internet_box 30 31To build a dictionary: 32[Internet box]~# ./dics source_ip_of_box 100 33./wesside -s ip_of_internet_box 34Use tap3 as if it were the wifi. 35