evilsocket / pwnagotchi

(⌐■_■) - Deep Reinforcement Learning instrumenting bettercap for WiFi pwning.
https://pwnagotchi.ai/
Other
7.35k stars 1.13k forks source link

Support of WEP Networks #965

Open PwnPeter opened 3 years ago

PwnPeter commented 3 years ago

I haven't seen any mention of the WEP protocol anywhere. I think this would be a significant plus.

qkum commented 3 years ago

1# They are more or less non-existent in 2021 in the Western world.

2# You are likely new to pentest/hacking game. One big problem with WEP is that if you attack a WEP network...you always end up with the password of the wifi. Not just an encrypted password. You get the REAL UN-ENCRYPTED PASSWORD = illegal in most countries. Or in other words having WEP 5000 packets on your pc is just as good as the password. You can 100% break the encryption in seconds in 2021. So it is a nono legally wise.

PwnPeter commented 3 years ago

1# They are more or less non-existent in 2021 in the Western world.

2# You are likely new to pentest/hacking game. One big problem with WEP is that if you attack a WEP network...you always end up with the password of the wifi. Not just an encrypted password. You get the REAL UN-ENCRYPTED PASSWORD = illegal in most countries. Or in other words having WEP 5000 packets on your pc is just as good as the password. You can 100% break the encryption in seconds in 2021. So it is a nono legally wise.

1# I still see many in France

2# Pwnagotchi uses deauthentication attack (DOS) to grab the WPA handshake, which is illegal without authorizations in all contries. So for me this is not a valid argument for not integrating WEP support. Just add an option to disable it like the deauthentication option and I don't see the problem :)

qkum commented 3 years ago

1# They are more or less non-existent in 2021 in the Western world. 2# You are likely new to pentest/hacking game. One big problem with WEP is that if you attack a WEP network...you always end up with the password of the wifi. Not just an encrypted password. You get the REAL UN-ENCRYPTED PASSWORD = illegal in most countries. Or in other words having WEP 5000 packets on your pc is just as good as the password. You can 100% break the encryption in seconds in 2021. So it is a nono legally wise.

1# I still see many in France

2# Pwnagotchi uses deauthentication attack (DOS) to grab the WPA handshake, which is illegal without authorizations in all contries. So for me this is not a valid argument for not integrating WEP support. Just add an option to disable it like the deauthentication option and I don't see the problem :)

You are crazy man.

If you sniff the 5000 packets as the software automatically does. You literally got their password. You broke in by catching 5000 packets from the air. The software cracks it auto in 20 sek or so. Even if they picked a good password.

WPA - Everything not WEP = You don't got their password even if you had 1 million of handshakes. It is harmless that you got encrypted handshakes. You have not broken into anybody's property. And you can't break it in seconds like WEP...

You don't know what you talk about. Deauch does not even kick people off the wifi if you only send a few deauch packets. Your pc reconnects faster than the icon in the lower right corner of your screen can show that you have been kicked of.

Deauch is more like in the grey area of legality. You will likely get a warning and at worst a fine - if you don't talk politely to the police. If you hacked people you ofc go to jail.

It is 100% on purpose that pwnagotchi does not attack WEP networks.

uwuforever commented 3 years ago

There is a perfectly legitimate use of including WEP support: convincing people who still run outdated WEP networks to switch off of WEP is so much easier if you can demonstrate to them just how easy it is to get their password. "Hey boss, check this out, all I gotta do is literally plug this thing in for 30 seconds and our Wifi password comes up. It's time to upgrade."

You can use a WEP sniffer in legitimate ways, just as you can use a WPA sniffer in an illegal way. The only difference is the strength of the cryptography. It's not a good argument not to include it as a feature.

I think pwnagotchi doesn't support it because it's uncommon to see WEP networks nowadays, but it should be included if not for any other reason, than to be feature-complete. You can always disable it if you're uncomfortable using it, and if you're not in an area where it's legal for you to sniff the traffic, you shouldn't be using a pwnagotchi there anyways, whether or not it has the WEP feature enabled.