LinuxCommandLibrary
GitHubF-DroidGoogle Play Store

easside-ng

automated WEP key recovery tool

TLDR

Start with interface and buddy server
$ sudo easside-ng -f [wlan0] -s [buddy_ip]
copy
Target a specific BSSID
$ sudo easside-ng -f [wlan0] -s [buddy_ip] -v [00:11:22:33:44:55]
copy
Lock to a specific channel
$ sudo easside-ng -f [wlan0] -s [buddy_ip] -c [6]
copy
Determine Internet IP only
$ sudo easside-ng -f [wlan0] -s [buddy_ip] -n
copy

SYNOPSIS

easside-ng [options] -f interface -s buddyip_

DESCRIPTION

easside-ng is a tool from the Aircrack-ng suite designed for automated WEP key recovery. It communicates with an external "buddy" server to decrypt packets without needing the WEP key, enabling network access.The tool automates the attack process against WEP-encrypted networks, exploiting known vulnerabilities in the WEP protocol.

PARAMETERS

-f interface

Wireless interface to use (mandatory).
-s ip
Buddy-ng server IP address (mandatory).
-v mac
Victim BSSID (target access point MAC address).
-m mac
Source MAC address.
-i ip
Source IP address.
-r ip
Router IP address.
-c channel
Lock card to this channel.
-n
Determine Internet IP only.
-h
Display help.

CAVEATS

Requires wireless card supporting monitor mode and packet injection. WEP is deprecated and rarely used. Only for authorized security testing. Requires buddy-ng server running on the internet. May be illegal without proper authorization.

HISTORY

easside-ng is part of the Aircrack-ng suite, developed from the original Aircrack project. The tool was created to demonstrate WEP vulnerabilities and for legitimate security testing. WEP attacks helped drive the adoption of WPA/WPA2.

SEE ALSO

Copied to clipboard
Kai