LinuxCommandLibrary

wesside-ng

Automated WEP key recovery tool

TLDR

Start automated WEP key recovery on an interface

$ sudo wesside-ng -i [wlan0mon]
copy
Target a specific network (BSSID)
$ sudo wesside-ng -i [wlan0mon] -v [00:11:22:33:44:55]
copy
Specify network IP address
$ sudo wesside-ng -i [wlan0mon] -n [192.168.1.0]
copy
Set maximum channel to scan
$ sudo wesside-ng -i [wlan0mon] -f [13]
copy
Gather PRGA without cracking
$ sudo wesside-ng -i [wlan0mon] -c
copy

SYNOPSIS

wesside-ng -i interface [-v bssid] [-n netip] [-m myip] [-a mymac] [-c] [-p minprga] [-t threshold] [-f maxchan]

DESCRIPTION

wesside-ng is an automated WEP key recovery tool from the Aircrack-ng suite. It performs a complete attack sequence without user intervention: network identification, association, PRGA data collection, IP scheme determination, ARP request injection, and WEP key cracking.
The tool exploits weaknesses in WEP encryption by injecting packets to generate traffic containing IVs (initialization vectors) needed for key recovery. It uses the fragmentation attack technique to obtain PRGA data, then reinjects ARP requests to accelerate IV collection.
wesside-ng requires a wireless adapter capable of packet injection in monitor mode. The interface must be set to monitor mode before running the tool (typically using airmon-ng).

PARAMETERS

-i interface

Wireless interface to use (required). Must be in monitor mode.
-v bssid
Target victim BSSID (MAC address of access point).
-n netip
Network IP address to use.
-m myip
Source IP address to use for injected packets.
-a mymac
Source MAC address to use.
-c
Collect PRGA data but do not crack the key.
-p minprga
Minimum bytes of PRGA (pseudo-random generation algorithm) data to gather.
-t threshold
Cracking threshold value.
-f maxchan
Highest channel to scan. Default is 11.
-k txnum
Ignore acknowledgments and transmit txnum times.
-h
Display help message.

CAVEATS

WEP is obsolete and should not be used for wireless security. This tool is for authorized security testing and educational purposes only. Unauthorized network access is illegal. Requires compatible wireless hardware with injection support. May not work reliably on all networks or with all hardware.

HISTORY

wesside-ng was originally written by Andrea Bittau as a proof-of-concept for research papers "The Fragmentation Attack in Practice" and "The Final Nail in WEP's Coffin" (co-authored with Mark Handley and Joshua Lockey). It was incorporated into the Aircrack-ng suite to demonstrate practical WEP vulnerabilities. The tool's relevance has diminished as networks migrated to WPA/WPA2/WPA3.

SEE ALSO

> TERMINAL_GEAR

Curated for the Linux community

Copied to clipboard

> TERMINAL_GEAR

Curated for the Linux community