Necessity
is the mother of invention
(Mater
atrium necessitas)
Anon. Latin Proverb,
which means Lindsworth Deer, who lived in Rome, said this first
After
the nascent and gradually rising popularity of my Geezam blog
article entitled “How
to access any WEP or WPA/WPA2 Wi-Fi Network that has a password” on (like duh-uh!)
accessing Password-protected WEP (Wired Equivalent Privacy) or stronger WPA
(Wi-Fi Protected Access) encrypted Wi-Fi Networks, my ratings in the ACCENT
Marketing Cafeteria aka Roses Cantina has fairly skyrocketed.
Muted
whispers of “there goes the Wi-Fi hacker” pass my way. Especially as I’ve now received training on the new AQUOS line of
products from SHARP Corp of Japan, which certifies me to handle and
troubleshoot their Wi-Fi Streaming Capable line of Smart TV come Monday 21
January 2013. Still I remain humble; AQUOS brand is spreading to smartphones
and eventually Tablets, fodder for another article on SHARP.
But
a little Indian femme fetale
complained to me that my article is for “like, nerds” who are into Linux and
Open Source. Surely, there must be some Windows based Software that can be used
to access password protected WEP and WPA/WPA2 encrypted Wi-Fi Networks that
won’t take the entire day in a
process that’s as exciting as watching paint dry?
Turns
out there is, actually. After some due diligence on my part and a tipoff from a
FB Fan of my blog, I located such a software package: TamoSoft CommView for WiFi 6.3.
This software package is actually a wireless network monitor and analyzer for
802.11 a/b/g/n networks used by Network Administrators to analyze their Wi-Fi
Networks. Best of all, it’s Windows 7/XP Professional compatible, so you can
reach for your mouse while using this nifty software tool.
TamoSoft CommView for WiFi 6.3
is Nirvana for Network Protocol geeks such as myself. It has the following uses
that, again, mainly appeal to Network Administrators:
1. Scan
for Wi-Fi stations and access points.
2. Capture
802.11a, 802.11b, 802.11g, and 802.11n WLAN traffic.
3. Specify
WEP or WPA keys to decrypt encrypted packets.
4. View
detailed per-node and per-channel statistics.
5. View
detailed IP connections statistics: IP addresses, ports, sessions, etc.
6. Reconstruct
TCP sessions.
7. Configure
alarms that can notify you about important events, such as suspicious packets,
high bandwidth, utilization, unknown addresses, rogue access points, etc.
I’ve
been playing with this software and trust me it works. In fact the research on
this article is being done using a Wi-Fi Network whose password I’d acquired
from a nearby Router.
Again,
as with the previous DIY (Do-It-yourself) Geezam blog
article entitled “How
to access any WEP or WPA/WPA2 Wi-Fi Network that has a password”, the following
requirements should be on your checklist:
1. USB Wi-Fi Adapter capable of packet
injection (ask the Computer store tech!). The Alfa AWUS050NH
USB Wi-Fi Adapter is best; buy it on Amazon.com with your Scotia VISA Debit
Card. Tell ‘em it’s for Science Research
2. Notepad
and a Pen. Yes, you’ll have to take notes…again
3. Desktop
Computer with a CD-DVD Drive with at least 2GB RAM and 320GB Hard-Drive
4. TamoSoft CommView for WiFi 6.3
which you can torrent or be a good sport and purchase it from TamoSoft’s Website
for US$400 for the basic version or US$999 for the VoIP capable Version; you’ll
get more professional support there.
5. Your
own WEP or WPA/WPA2-enabled Wi-Fi Network. That’s for a crash test dummy, in
case you’re not up to hacking your neighbour’s Wi-Fi Network
6. Target
WEP or WPA/WPA2-enabled Wi-Fi Network. The signal should be strong with people
connected and actively using the Wi-Fi Network, which increases the chances of
accessing the Network. Also again, preferably a neighbor you don’t like
7. Patience
like Noah or Enoch in the Old Testament section of the Bible. It’s Windows
7/Windows XP Compatible folks; your mouse’ll get to run a few laps in the
treadmill this time!
The
steps for this DIY are straightforward and simple:
1. Click
on Tools then WEP Key Recovery. Make sure you have at least 500MB of free space
as a typical sessions needs to samples at least 10,000 packets to get a lock on
the Wi-Fi Network’s Password.
2. After
the session is complete, which may take a few seconds for 64 bit keys to
several hours for 128-, 152-and 256-bit keys, select Tools then WEP Keys to
view the password keys for the Wi-Fi Network analyzed.
3. That’s
it! You’ve now recovered the Password for the password protected WEP and WPA/WPA2
encrypted Wi-Fi Networks.
Use
your knowledge wisely folks as you travel on the Information Superhighway!
Here’s the links:
No comments:
Post a Comment