wesside-ng
Automated WEP key recovery tool
TLDR
Start automated WEP key recovery on an interface
SYNOPSIS
wesside-ng -i interface [-v bssid] [-n netip] [-m myip] [-a mymac] [-c] [-p minprga] [-t threshold] [-f maxchan]
DESCRIPTION
wesside-ng is an automated WEP key recovery tool from the Aircrack-ng suite. It performs a complete attack sequence without user intervention: network identification, association, PRGA data collection, IP scheme determination, ARP request injection, and WEP key cracking.
The tool exploits weaknesses in WEP encryption by injecting packets to generate traffic containing IVs (initialization vectors) needed for key recovery. It uses the fragmentation attack technique to obtain PRGA data, then reinjects ARP requests to accelerate IV collection.
wesside-ng requires a wireless adapter capable of packet injection in monitor mode. The interface must be set to monitor mode before running the tool (typically using airmon-ng).
PARAMETERS
-i interface
Wireless interface to use (required). Must be in monitor mode.-v bssid
Target victim BSSID (MAC address of access point).-n netip
Network IP address to use.-m myip
Source IP address to use for injected packets.-a mymac
Source MAC address to use.-c
Collect PRGA data but do not crack the key.-p minprga
Minimum bytes of PRGA (pseudo-random generation algorithm) data to gather.-t threshold
Cracking threshold value.-f maxchan
Highest channel to scan. Default is 11.-k txnum
Ignore acknowledgments and transmit txnum times.-h
Display help message.
CAVEATS
WEP is obsolete and should not be used for wireless security. This tool is for authorized security testing and educational purposes only. Unauthorized network access is illegal. Requires compatible wireless hardware with injection support. May not work reliably on all networks or with all hardware.
HISTORY
wesside-ng was originally written by Andrea Bittau as a proof-of-concept for research papers "The Fragmentation Attack in Practice" and "The Final Nail in WEP's Coffin" (co-authored with Mark Handley and Joshua Lockey). It was incorporated into the Aircrack-ng suite to demonstrate practical WEP vulnerabilities. The tool's relevance has diminished as networks migrated to WPA/WPA2/WPA3.
SEE ALSO
aircrack-ng(1), airmon-ng(8), aireplay-ng(8), airodump-ng(8), easside-ng(8)
