1.2.2 Manual for WEP keys BEINI
New Manual LaCuevaWifi for wireless audits. This time we tried the BEINI and continue using our Crotalus USB 2000mW with Ralink 3070L.
The first thing you have to do is boot your computer from the USB (or CD) which have the Beini. When finished loading have to start implementing audits called "FeedingBottle" on the bottom bar is the icon that looks like a bottle.
Once opened, leave us a warning (which we must consider, "Please do not crackees Access Points outside, only tests the yours"), click on "Yes".
Now we choose the card you want to put in monitor mode to the audit:
We'll get a message telling you is already in monitor mode, click on Next.
Now let's scan the wireless networks around us, before clicking the "Scan ..." button you can choose the type of encryption key, the channels you search or scan time that default is 30 seconds. Once we have everything ready click on "Scan ...".
We see how you are looking for the networks.
When finished scanning it will leave the following screen:
Here we select the network you want, we can see in the lower left (Clients Information) customers have associated the network. Click on "Next" to the next step.
On the next screen we will get the network name and MAC, now we have to adjust the parameters of attack, in this case we choose the second option (P0841 REPLAY ATTACK), and mark the "Fake Auth (by force)" option. When we have everything ready click on Start.
We see how you are capturing #Data to decrypt the key. When we have enough data capture will stop and show us the key:
We quote some of the cards we tested, and operated the steps followed in this manual:
Obviously these are not the only wireless USB compatible but these are among the best we've tested.