BEINI 1.2.2 Manual for WEP keys
New Manual LaCuevaWifi for wireless audits. This time we tried the BEINI and continue using our Crotalus with Ralink 3070L 2000mW USB.
The first thing you have to do is boot from the usb (or cd) that we have the Beini. When finished loading have to start implementing audits called "FeedingBottle" on the bottom bar is the icon that looks like a bottle.
Once opened, leave us a warning (which we must consider, "Please do not crackees APs outside only tests the yours"), click on "Yes".
Now we choose the card you want to put in monitor mode to the audit:
We'll get a message saying it is already in monitor mode, click on Next.
Now let's scan the wifi networks around you before you press the "Scan ..." button you can choose the type of encryption key, the channels in which to search or scan time by default is 30 seconds. Once we have everything ready click on "Scan ...".
We observe how the networks are looking for.
When finished we will scan the following screen:
Here we select the network you want, we can see in the lower left (Clients Information) customers who have partners that network. Click on "Next" to the next step.
On the next screen we will get the network name and MAC, now we have to set the parameters of attack, in this case we will choose the second option (P0841 REPLAY ATTACK), and mark the "Fake Auth (by force)" option. When we have everything ready press Start.
We observe how you are capturing #Data to decipher the key. When we have sufficient data capture will stop and show us the key:
We quote some of the cards we've tested and running follow the steps in this guide:
Obviously these are not the only USB Wifi compatible but these are the best we've tested.