BOTTLE FEEDING METHOD FOR WEP PASSWORDS

The module  Feeding Bottle  is integrated into all versions of Beini and like the minidwep-gtk , is one of the easier and faster to audit the level of security of our network methods wireless . It is based on the  aircrack-ng suite . With just a few simple steps will be able to decipher our WEP password , and so we check what we are vulnerable to intruders.

I take obvious that you know that the program should download it by , burn it to a cd, change the BIOS boot for the first system to be bootee is the CD-ROM. If you do not, do not worry, we have an entry that you will clear all your doubts and help you make the first steps to use Beini .

The first thing to do once inside Beini desktop, you can click on the icon of the bottle. If you hover over it we read "Feeding Bottle" bottle appears in English.

Then the system warns us not crakeemos another network than ours. Logically, as we want to test the security of our network, we give YES and forth.

In this new window that has opened us select our wifi card, and wait until we receive the message " monitor mode enabled ", this indicates that we find in monitor mode. If you do not appear to select any wifi card is because the chip does not support the program. Then we try another computer or buy a external wifi adapter via USB . We will recommend the model BT-N9100 Blueway  for its great functionality and high performance or this other cheap  and similar items.

We continue with "Next" and this leads to a new window which will scan / track all wifi networks at our disposal. The parameters that are selected by defects is to scan all WEP networks for 30 seconds. We left it as it comes and you click on Scan. A window will be opened for the duration of the scan. After that, we select our wireless network from the list and continue with "Next".

On this next screen, we will change the parameters of attack. Select an attack by fragmentation, "Fragmentattion Forge Attack" and mark the box that says "Fake Auth (by force)."

Once we changed everything stated in the previous section, we proceed to start the attack, give Start and we can only hope. The time can vary depending on whether we have customers connected to our network or not. If so, in 5 or 10 minutes have achieved decrypt our password. No need to stop the program, once a sufficient data collected to decrypt the password, the program stops and shows it.
Close Menu