Download List

專案描述

Weplab is a tool to review the security of WEP
encryption in wireless networks from an
educational point of view. Several attacks are
available, so it can measure the effectiveness and
minimum requirements of each one. Currently,
weplab supports several methods, and it is able to
crack the WEP key from 600,000 encrypted packets.

System Requirements

System requirement is not defined
Information regarding Project Releases and Project Resources. Note that the information here is a quote from Freecode.com page, and the downloads themselves may not be hosted on OSDN.

2005-07-18 23:03
0.1.5

A bug with small packets (like arp) has been fixed. The minimun size has been decreased to 20 bytes. This release works like a charm with an arp replay attack. It prints the right ASCII password when a WEP key is cracked using the dictionary mode.
標籤: Minor bugfixes

2005-03-06 12:31
0.1.4

A bug in bruteforge.c was fixed, and a new way to
coordinate multiple process cracking was
implemented. Another bug in bruteforge.c was fixed
to allow --ascii to go up to 0x7F. Support was
added for --alpha (only letters) and --alnum
(letters and numbers) in the bruteforce attack.
wlan0 is now the default interface for capturing
packets. Pressing "q" now quits sniffing and
flushes the pcap file. Help for command line
parameters was simplified. Some divide by 0 bugs
were fixed. The --wordfile option was added to
make it possible to launch the dictionary based
attack without using John the Ripper to generate
words.
標籤: Minor feature enhancements

2004-12-10 05:32
0.1.3

This release fixes a bug with those WEP keys which have a
0xFF byte value, a bug that made Weplab show the wrong
BSSID with --analyze, and a problem with --ascii in
bruteforce attack. There is now a manual page. Minor bugs
were fixed related to console printed messages.
標籤: Major bugfixes

2004-09-11 14:36
0.1.2

The default options for statistical attacks have changed and are now
[ -s 3 --perc 50 ]. The commandline options are now more relaxed and
robust. A PRISM_HEADER datalink has been added for capture packets. This
release has been tested and works fine with John The Ripper 1.6.
標籤: Minor bugfixes

2004-09-09 18:02
0.1.1

BSSID is automatically detected and selected if it
is not specified with --bssid. The "analyze"
switch (-a) now shows all packets per BSSID. Big
endian issues fixed. Small fixes were made for the
Windows platform. A small bug was fixed with rc4
decryption. A small change was made to Korek
inverse attack.
標籤: Minor feature enhancements

Project Resources