This page concentrates every article I’ve done so far on using the AirPcap Wireless capture device for security auditing or “cracking”.
Using AirPcap with Cain and Able to crack WEP
One of my first video tutorials showing how to crack WEP in Microsoft Windows, using CACE Technology’s AirPcap adapter. Read ‘Using AirPcap with Cain and Able to crack WEP‘.
Using aircrack-ptw to speed up cracking WEP in Windows
Covers using the aircrack-ptw tool (compiled for Windows) to speed up the WEP cracking process. Read ‘Using aircrack-ptw to speed up cracking WEP in Windows‘.
Cracking WEP on the Windows command line using AirPcap and aircrack-ng
Covers using the AirPcap, in combination with a specially compiled Windows version of aircrack-ng. By using the command line, you can speed up cracking when compared to using the Cain GUI. Read ‘Cracking WEP on the Windows command line using AirPcap and aircrack-ng‘.
How to decrypt WPA using Wireshark and AirPcap
Shows how to use Wireshark, in conjunction with AirPcap to decrypt your raw Wi-Fi WPA traffic on-the-fly. Read ‘How to decrypt WPA using Wireshark and AirPcap‘
Using AirPcap to passively crack WEP
This was an intial exploration into cracking WEP by passively sniffing WEP traffic in Windows, using the AirPcap adapter – the first USB adapter for Windows to enable passive Wi-Fi sniffing. Read ‘Using AirPcap to passively crack WEP‘.
Run Kismet in Windows using AirPcap
CACE compiled a special version of Kismet which utilises the AirPcap adapter, and runs on Windows. Read Kismet on Windows without a drone.