Friday, March 26, 2010

Ethernet over power lines: Netgear makes major improvements

(from TechRepublic)
Using in-house electrical wiring for networking computers usually only happens if wires can’t be run or Wi-Fi connections are less than adequate. Netgear’s new Ethernet over power-line devices may change that.

————————————————————————————————–

Last year, I went through what I consider the perfect storm of network cabling. To explain, I was asked by a client to set up an Ethernet network at one of his rental facilities. For some reason, I could not run cables. To make matters worse, there was an inordinate amount of grounded metal (galvanized studs) acting like RF sponges. That eliminated Wi-Fi gear as an option.

Out of options, I tried Netgear’s Powerline equipment and was disappointed. Bandwidth never came close to what Netgear advertised. Still, the client was not deterred by the limited throughput. They were happy to have anything at all. I guess sneaker networks get old fast.

New and improved

Previously, Netgear offered two product lines, one rated at 85 Mb per second and one at 200 Mb per second. Both were lucky to achieve half that throughput. Still, Netgear seems determined to make Power line Ethernet a viable solution. They just announced a new product line that may take care of the bandwidth problem. The new adapters have the following enhancements :

Throughput speed of 500 Mb per second.
The first devices to comply with IEEE draft P1901 standard.
Prioritized Quality of Service (QoS), important for streaming media applications.
Simple 128-Bit AES encryption, using the “Push-and-secure” button.
Backward compatible with other Netgear Powerline products and equipment from other vendors, if it’s HomePlug AV certified.

Two models

Netgear is offering two models, the Powerline AV 500 Adapter Kit/XAVB5001 (courtesy of Netgear):





As well as the Powerline AV+ 500 Adapter Kit/XAVB5501 (courtesy of Netgear):



Netgear mentions that the devices are designed to leave the second socket of an outlet pair open for use. Also, the XAVB5501 provides a filtered power socket, if outlets are in short supply. Each kit comes with two adapters.

Thursday, March 11, 2010

Install 64-bit Adobe Flash Player on Ubuntu (updated to 9.10)


FlashNow that there is a java browser plugin and a working wine for 64-bit on the Ubuntu repositories, there is not much holding back 64-bit Linux on the desktop. Maybe the only thing missing is the Adobe Flash player. Most of the time Flash is just annoying, nevertheless sometimes needed. Luckily, there is now a Flash Player release for 64-bit Linux (however, still beta alpha but stable so far) . I am pretty sure the instructions are identical for other Linux distributions.

To install it:

1. Download it from here (now here).

2. Unpackage it using a terminal (with the assumption your firefox downloads into your Desktop as default):
cd Desktop
tar xvzf libflashplayer-10.0.32.18.linux-x86_64.so.tar.gz

(The name of the tar.gz file may change when a new version is released, change accordingly).

3. Create a plugin directory in your $HOME (instead of a system directory):

cd
mkdir -p .mozilla/plugins

4. Move the file to the plugin directory:
mv Desktop/libflashplayer.so .mozilla/plugins

5. Restart firefox. Go to about:plugins to see if it’s enabled:
about:plugins


That’s it.

Edit: Alternatively, you can use the graphical approach:

1. go to the download pages and click on “Download 64-bit Plugin for Linux (TAR.GZ, 3.64 MB)”.
2. select “Open with ” in firefox (you have to click on open to enable the ok button) and clck on OK.
3. The archive manager will open and show you the libflashplayer.so file.
4. Click on extra and a save window will open.
5. Type ctrl + h to show hidden files. Go to .mozilla (dubble click).
6. If no “plugins” directory is present, click on “Create Folder” on the top right and type as name “plugins” (without the quotes). Press Ener.
7. Click on Extract.
8. Click on Close on the windows showing the result.
9. Close the archive manager.
10. Restart firefox.

Tuesday, March 2, 2010

The US war on open source

(Credits to Chin Wong, Digital Life, http://url4.eu/1VdVO)

FOR years, American companies have been beating developing countries over the head for copyright violations, egging the US government to threaten trade sanctions against those who do not toe the intellectual property line. Now the same US companies are trying to bludgeon countries such as India, Indonesia, the Philippines, Thailand and Vietnam into abandoning policies that favor open source software for use in their own public agencies.


Let’s think about that for a moment.

These US companies want to dictate to our government how to go about procuring the software that we use. And the weapon they wield is the annual Special 301 Report issued by the Office of the United States Trade Representative, a federal agency responsible for developing and recommending trade policy to the US president.

As part of its yearly review, the US trade agency studies the recommendations submitted by various American trade associations, and puts the worst violators of intellectual property rights into its Priority Watch List, a group that could face US trade sanctions.

The International Intellectual Property Alliance (IIPA), an umbrella organization of about 1,900 US companies from the publishing, film and TV, music and software industries, has been religious in making its voice heard in the annual review.

In its latest report, a 498-page document, the IIPA recommended that the Philippines be moved into the Priority Watch List for a number of continuing copyright problems, including our easy access to cheap DVD entertainment.

Then, in a portion on draft legislation, it added: “IIPA was concerned regarding reports of consideration of a Free Open Source Software bill which would require government offices to use open source software. Passage of that bill would deny technology choice regarding software usage and ultimately would stunt the growth of the IT industry in the Philippines.”

The group was even more hostile when it came to Indonesia, Thailand and Vietnam, which already have such policies in place. In these instances, the US trade group argued that open source doesn’t really reduce piracy and may even encourage it by not giving software its proper value.

In one part of the report, the IIPA takes Thailand to task for wanting to bundle free and open source software on 1.4 million computers for the school system as a way of saving money and ensuring that the programs used are not pirated.

Elsewhere, the association strongly urges the US Trade Representative “to consider the implications that Indonesia’s open source preference policy has on IP protection and access to Indonesia’s market for US goods and services.”

“The Indonesian government’s policy… simply weakens the software industry and undermines its long-term competitiveness by creating an artificial preference for companies offering open source software and related services, even as it denies many legitimate companies access to the government market,” the IIPA said. “Rather than fostering a system that will allow users to benefit from the best solution available in the market, irrespective of the development model, it encourages a mindset that does not give due consideration to the value to intellectual creations. As such, it fails to build respect for intellectual property rights.”


The last sentence is a steaming pile of cow manure. Open source advocates and developers respect intellectual property rights; that’s why open source projects are covered by licenses, too. Users just don’t have to pay exorbitant fees for them.

In attacking open source, the IIPA neglects to point out that major American technology companies, including IBM and Oracle, already do a substantial amount of business using this model. Would they, too, be denied access to government bids that required open source solutions?

In any commercial transaction, the buyer must be free to set the terms of the sale. In the case of public agencies, that buyers is ultimately the government. If the government wants to buy, say, combat boots that are built to certain specifications, manufacturers who cannot meet those requirements should not whine about limited market access. They should just build better boots.

If the government wants to save on licensing fees by going open source, nobody, least of all software companies with vested interests, should be able to stop them from doing so. Nor should the US government, which itself uses open source software, buy into this rubbish that doing so somehow corrodes intellectual property rights. That’s just silly.


Posted by Chin on 03/02/10 at 08:49 AM

Thursday, February 18, 2010

3G vs. Terrestrial Broadband

3G vs. Terrestrial Broadband
Lincoln Spector

Jan 5, 2010 12:16 am

Phil Kunde wants to know if the 3G Internet access available through his cell phone provider makes a viable alternative to conventional broadband such as cable or DSL.

Not in my book. While cell-based Internet access has one big advantage--you can access the Internet on your PC anywhere you can use your cell phone--it contains some very serious negatives.

For one thing, it's slow. Cell carriers like Sprint and Verizon promise download speeds that top out at only about 1.4Mbps--and can drop as low as .6Mbps. "Wireless signal, by its nature, is extremely variable; that is, many things, such as obstruction by fixed objects (buildings, trees, etc.), weather, network load, cell tower locations, and time of day, can affect the quality of the signal," says Mark Sullivan in A Day in the Life of 3G. (I'm sticking to 3G numbers here because, as I write this, the much faster 4G is still relatively rare in the United States.)

By comparison, 6Mbps DSL and 16Mbps cable connections are readily available.

The difference gets more extreme when you take price into consideration. AT&T charges the same $35 a month for 6Mbps DSL and 1.4Mbps (if you're lucky) 3G. But the $35 3G plan sticks you with a 200MB monthly allowance; I've downloaded individual files bigger than that. For $60 a month, you get 5GB, which is more reasonable but still wouldn't cover my family's Internet habits.

Speaking of families, a 3G connection can be shared in a way similar to broadband--one point in its favor. You do this with a small, router-like MiFi device that you purchase from your carrier. It's small, portable, and can connect up to five WiFi-enabled devices to your 3G Internet signal. Using one regularly with several people, of course, pretty much guarantees that you'll hit that 5GB limit early each month.

Depending on your lifestyle or working conditions, cell-based Internet access may very well be invaluable. But unless you're like George Clooney's character in Up in the Air--constantly traveling, never at home, and with no family--it's not a valid replacement for DSL or cable.

At least not yet.

Add your comments to this article below. If you have other tech questions, email them to me at answer@pcworld.com, or post them to a community of helpful folks on the PCW Answer Line forum.



See more like this:internet,broadband,mobile broadband,networks,routers

MiFi: The Best Product of 2009


MiFi: The Best Product of 2009

Posted using ShareThis

Tuesday, October 27, 2009

SSD - Solid State Drive

- replacing the mechanical motor driven hard disk drive for computer storage devices.

What is a Solid State Drive?

Solid state is an electrical term that refers to electronic circuitry that is built entirely out of semiconductors. The term was originally used to define those electronics such as a transistor radio that used semiconductors rather than vacuum tubes in its construction. Most all electronics that we have today are built around semiconductors and chips. In terms of a SSD, it refers to the fact that the primary storage medium is through semiconductors rather than a magnetic media such as a hard drive.

Now, you might say that this type of storage already exists in the form of flash memory drives that plug into the USB port. This is partially true as solid state drives and USB flash drives both use the same type of non-volatile memory chips that retain their information even when they have no power. The difference is in the form factor and capacity of the drives. While a flash drive is designed to be external to the computer system, an SSD is designed to reside inside the computer in place of a more traditional hard drive.

So how exactly do they do this? Well, an SSD on the outside looks almost no different than a traditional hard drive. This design is to allow the SSD drive to put in a notebook or desktop computer in place of a hard drive. To do this, it needs to have the standard dimension as a 1.8, 2.5 or 3.5-inch hard drive. It also will use either the ATA or SATA drive interfaces so that there is a compatible interface.


Why Use a Solid State Drive?


Solid state drives have several advantages over the magnetic hard drives. The majority of this comes from the fact that the drive does not have any moving parts. While a traditional drive has drive motors to spin up the magnetic platters and the drive heads, all the storage on a solid state drive is handled by flash memory chips. This provides three distinct advantages:
Less Power Usage
Faster Data Access
Higher Reliability

The power usage is a key role for the use of solid state drives in portable computers. Because there is no power draw for the motors, the drive uses far less energy than the regular hard drive. Now, the industry has taken steps to address this with drive spin downs and the development of hybrid hard drives, but both of these still use more power. The solid state drive will consistently draw less power then the traditional and hybrid hard drive.

Faster data access will make a number of people happy. Since the drive doesn't have to spin up the drive platter or move drive heads, the data can be read from the drive near instantly. In a recent demo of two similar equipped notebook computers, Fujitsu was able to demonstrate a roughly 20% speed increase in the booting of Windows XP on a SSD over a standard hard drive.

Reliability is also a key factor for portable drives. Hard drive platters are very fragile and sensitive materials. Even small jarring movements from an impact can cause the drive to be completely unreadable. Since the SSD stores all its data in memory chips, there are fewer moving parts to be damaged in any sort of impact.


Why Aren't SSDs Used For All PCs?

As with most computer technologies, the primary limiting factor of using the solid state drives in notebook and desktop computers is cost. These drives have actually been available for some time now, but the cost of the drives is roughly the same as the entire notebook they could be installed into. This is gradually changing as the number of companies producing the drives and the capacity for producing the flash memory chips grows. Drives announced at the 2007 CES were priced at less than half of the drives of the same capacity from the previous year.

The other problem affecting the adoption of the solid state drives is capacity. Current hard drive technology can allow for over 200GB of data in a small 2.5-inch notebook hard drive. Most SSD drives announced at the 2007 CES show are of the 64GB capacity. This means that not only are the drives much more expensive than a traditional hard drive, they only hold a fraction of the data.

All of this is set to change soon though. Several companies that specialize in flash memory have announced upcoming products that look to push the capacities of the solid state drives to be closer to that of a normal hard drive but at even lower prices than the current SSDs. This will have a huge impact for notebook data storage.


RunCore 128GB Pro SATA 70mm Mini PCI-e PCIe SSD for ASUS EEE PC 900 900A 901 and S101  
Part#: RCP-I-S7028-C
Brand Name: RunCore
MB/GB Size: 128GB
Read/Write Speed: 125/95

Monday, October 19, 2009

Future Cellphones - Concepts

Transparent Mobile Phone by Mac

An excellent concept from Mac Funamizu of Tokyo who designed this cell phone concept that has been quite popular online.

flip transparent phone thumb Beautiful Transparent Cell Phones Concept mobile transparent screen thumb Beautiful Transparent Cell Phones Concept

mobile screen glass thumb Beautiful Transparent Cell Phones Concept transparent cellphone thumb Beautiful Transparent Cell Phones Concept

This glass concept transparent phone is a flip open phone made out of fragile glass. Pretty cool! Hope it’s unbreakable as well.

Windows Transparent Cellphone

This is another awesome cell phone which is not only confined to transparent nature, but also includes auto weather mode which switches itself depending on the weather condition. Check out the pics

rainy mobile concept thumb Beautiful Transparent Cell Phones Concept snow mobile phone thumb Beautiful Transparent Cell Phones Concept

This windows mobile phone is made out of thin sheet and once you blow on the screen it will turn into hand writing mode, and use your finger to text message or call.

transparent cell phone thumb Beautiful Transparent Cell Phones Concept transparent blow concept thumb Beautiful Transparent Cell Phones Concept

Synaptics ClearTouch™


Synaptics ClearTouch™ Technology Takes Touch Interfaces to the Next Level
Designers Can Move Beyond Buttons by Integrating Transparent Sensor Controls

SANTA CLARA, Calif.–April 22, 2008 - Synaptics Inc. (NASDAQ: SYNA), a leading developer of human interface solutions for mobile computing, communications, and entertainment devices, announced its ClearTouch™ product portfolio ClearPad™ and ClearArray™ sensors are available for a wide range of consumer electronics that require transparent touch-sensitive user interfaces.

Synaptics’ ClearTouch™ products are designed for durability, low power consumption, and easy integration. They enable attractive and intuitive user interfaces to meet the rigorous needs of consumer electronics. Patented ClearPad technology builds on the capacitive touch sensing technology used in over 400 million TouchPad devices. Synaptics has over a decade of experience in clear, two-dimensional, capacitive touch sensing. All ClearTouch solutions can operate under glass or plastic, resulting in robust devices with slim form factors and sleek industrial designs.

“Next-generation handsets will greatly benefit from touchscreen technology,” said Bill Morelli, research analyst at IMS. “Synaptics ClearTouch sensors provide an ideal solution and are well suited to a wide range of handset styles.”
ClearPad

A ClearPad sensor was the key feature in Synaptics’ pioneering Onyx concept touchscreen phone demonstrated in August 2006. ClearPad provides a robust, intuitive, and high-resolution touchscreen interface solution for today’s mobile devices – including mobile phones, portable music players, and handheld GPS devices.
ClearArray

Synaptics’ ClearArray interface solutions support buttons and scrolling in fixed locations over a display, a cost-optimized touchscreen solution. ClearArray sensors can even be used in monitors and kiosk-style devices as an alternative to mechanical buttons. These transparent sensors enable manufacturers to differentiate their products according to their target price point, industrial design requirements, and the desired end-user experience.
Capacitive vs. Resistive – How to Tell the Difference

Resistive touchscreens respond to pressure. When a user presses the screen, a top layer of flexible material makes contact with the lower layer to indicate the location of the user’s finger or stylus. The mechanical flexing of a resistive sensor reduces its durability and the air gap affects optical quality. Resistive interfaces also require frequent end-user calibration. Capacitive solutions such as Synaptics ClearTouch use a grid of conductive traces implemented on a clear substrate such as polyethylene terephthalate (PET) film or glass to accurately report one or more finger positions and relative pressure on a sensor. Synaptics ClearTouch solutions offer superior optics, are solid state, and require no end-user calibration.

As the number and sophistication of handheld applications proliferate, touchscreen technology is a must have for future devices. With multimedia- and communication-rich functionality, handheld devices require innovative interface technology to make accessing and managing applications and content easy for the end user. ClearTouch solutions unlock the potential of advanced devices with a lot of functionality through an intuitive interface that the average user can use without reading a manual.

"Synaptics' proven capacitive sensing technology has been used in more than 400 million devices,” said Andrew Hsu, strategic and technical marketing manager at Synaptics. “The ClearTouch product family enables users of next-generation data and media-centric handheld devices to enjoy an intuitive, accurate, responsive, and durable touchscreen interface."
Gesture Technology

Synaptics ClearPad solution includes integral detection of gestures such as single-finger Tap, Double Tap, Tap & Hold/Tap & Slide, Press, and Flick, as well as two-finger Pinch.
Availability

Synaptics ClearTouch solutions are available now to device manufacturers. More information on Synaptics’ transparent capacitive touch sensors can be found at http://www.synaptics.com/products/cleartouch.cfm

About Synaptics

Synaptics (NASDAQ: SYNA) is a leading developer of human interface solutions for the mobile computing, communications, and entertainment industries. The company creates interface solutions for a variety of devices including notebook PCs, PC peripherals, digital music players, and mobile phones. The TouchPad™, Synaptics’ flagship product, is integrated into a majority of today's notebook computers. Consumer electronics and computing manufacturers use Synaptics' solutions to enrich the interaction between humans and intelligent devices through improved usability, functionality, and industrial design. The company is headquartered in Santa Clara, Calif. www.synaptics.com

Friday, October 16, 2009

Sun Broadband Wireless prepaid


I'm doing a speedtest using my 3g phone as a modem hooked via USB cable to a laptop and with Sun Broadband Wireless prepaid.

I have here a Sony Ericsson 3G phone with a SUN prepaid SIM, a Pentium(old)4 1.7Ghz on WinXP Pro with Sony ericsson PCsuite installed, and browser such as Firefox, Google chrome and Opera 10. Also installed some add-ons and plugins like Adobe flash player and silverlight....

Here's my first test:

There are 3 tabs open on my gooogle chrome including the speedtest site running.



Fast? Only speedtest was running and no other browsing effect. See some results below.














The speedtest below run while another tab is open on live movie streaming.






















Sun Broadband Wireless can attain much more the speed that I'm getting from my 3g phone if I do have a 3.5g capable phone or rather HSDPA feature. My phone is only capable of 384kbps on 3g network. There are HSDPA phone models that can have up to 3.6Mbps or 7.2Mbps. But I guess maximum of 3.6Mbps HSDPA speed feature will be enough as of the moment. Whereas wireless broadband ISP's are in the top speed of 2Mbps up to 3Mbps(duh!)

Sun offers up to 2Mbps right now within metro manila coverage. I just loaded up SBW100 via XpressLoad(electronic load)

Below is what you get from SBW100 @ Php100;



1. You get 360minutes browsing time.
2. Or 6hours valid for 4 days. (i loaded up 10/16 @ 6pm, and valid up to 10/20)


I just started doing this test about an hour ago.





I am quite contented on the speed, I just ask if Sun Broadband Wireless prepaid could offer something like 24hours for 100pesos witn at least 5 days validity.

For pure browsing, emailing, youtube, movie streaming(need strong 3G signal), social networking and other stuff that do not require too much downloading bandwidth; I say, this can be enough just to get you online and do your web task. If you are torrent or P2P user, this is not for you...

Wednesday, October 14, 2009

WiFi - WEP cr4ck1ng





To successfully crack WEP/WPA,
you first need to be able to set your wireless network card in
"monitor" mode to passively capture packets without being
associated with a network. This NIC mode
is driver-dependent, and only a relatively small number of network cards
support this mode under Windows.

One of the best free utilities for monitoring
wireless traffic and cracking WEP/WPA-PSK keys is the aircrack-ng suite, which we will use
throughout this article. It has both Linux and Windows versions (provided your network
card is supported under Windows). The aircrack-ng site has a comprehensive list
of supported network cards available here: NIC chipset
compatability list.

If your network card is not supported under
Windows, one can use a free Linux Live CD to boot the
system. BackTrack 3
is probably the most commonly used distribution, since it runs from a Live
CD, and has aircrack-ng and a number of related tools already
installed.

I am using aircrack-ng
version 1.0 on a Linux partition (Fedora Core 10, 2.6 32-bit
kernel) on my Sony Vaio SZ-680 laptop, using the built-in Intel
4965agn network card. If you're using the BackTrack 3 CD aircrack-ng is already
installed, with my version of linux it was as simple as finding it with:

yum search aircrack-ng
yum install aircrack-ng

The aircrack-ng suite is a collection of
command-line programs aimed at WEP and WPA-PSK key cracking. The ones we will be
using are:

airmon-ng - script used for switching the
wireless network card to monitor mode
airodump-ng - for WLAN monitoring and capturing network packets
aireplay-ng - used to generate additional traffic on the wireless network
aircrack-ng - used to recover the WEP key, or launch a dictionary attack on
WPA-PSK using the captured data.



1. Setup (airmon-ng)

As mentioned above, to capture network
traffic wihtout being associated with an access point, we need to set the
wireless network card in monitor mode. To do that under linux, in a terminal
window (logged in as root), type:

iwconfig (to find all wireless network interfaces and their
status)
airmon-ng start wlan0 (to set in monitor mode,
you may have to substitute wlan0 for your own interface name)

Note: You can use the su command to
switch to a root account.

Other related Linux commands:

ifconfig (to list available network interfaces, my
network card is listed as wlan0)
ifconfig wlan0 down (to stop the specified network card)
ifconfig wlan0 hw ether 00:11:22:33:44:55 (change the MAC
address of a NIC
- can even simulate the MAC of an associated client. NIC should
be stopped before chaning MAC address)
iwconfig wlan0 mode monitor (to set the network card in monitor mode)
ifconfig wlan0 up (to start the network card)
iwconfig - similar to ifconfig, but dedicated to the wireless
interfaces.



2. Recon Stage (airodump-ng)

This step assumes you've already set your
wireless network interface in monitor mode. It can be checked by executing
the iwconfig command. Next step is finding available wireless
networks, and choosing your target:

airodump-ng mon0 - monitors all channels, listing available access
points and associated clients within range. It is best to select a target
network with strong signal (PWR column), more traffic (Beacons/Data
columns) and associated clients (listed below all access points). Once you've
selected a target, note its Channel and BSSID (MAC
address). Also note any STATION associated with the same BSSID (client MAC
addresses).







WEP is much easier to crack than WPA-PSK, as it only
requires data capturing (between 20k and 40k packets), while WPA-PSK needs a
dictionary attack on a captured handshake between the access point and an
associated client which may or may not work.



3. Capture Data (airodump-ng)

To capture data into a file, we use the
airodump-ng tool again, with some additional switches to target a specific AP
and channel. Most importantly, you should restrict monitoring to a single
channel to speed up data collection, otherwise the wireless card has
to alternate between all channels. Assuming our wireless card
is mon0, and we want to capture packets on channel 6 into a text file
called data:

airodump-ng -c 6
bssid 00:0F:CC:7D:5A:74 -w data mon0 (-c6 switch would capture data on channel 6,
bssid 00:0F:CC:7D:5A:74 is the MAC address of our target access point, -w data
specifies that we want to save captured packets into a file called
"data" in the current directory, mon0 is our wireless network
adapter)




Notes:
You typically need between 20,000 and 40,000 data packets to successfully
recover a WEP key.
One can also use the "--ivs" switch with the airodump-ng command
to capture only IVs, instead of whole packets, reducing the required
disk space. However, this switch can only be used if targeting a
WEP
network, and renders some types of attacks useless.



4. Increase Traffic
(aireplay-ng) - optional step for WEP
cracking

An active network can usually be penetrated
within a few minutes. However, slow networks can take hours, even days to
collect enough data for recovering the WEP key.

This optional step allows a compatible
network interface to inject/generate packets to increase traffic on the
wireless network, therefore greatly reducing the time required for capturing
data. The aireplay-ng command should be executed in a separate
terminal window, concurrent to airodump-ng. It requires a compatible network
card and driver that allows for injection mode.

Assuming your network card is capable of
injecting packets, in a separate terminal window try:

aireplay-ng -3 -b 00:0F:CC:7D:5A:74
-h 00:14:A5:2F:A7:DE -x 50 wlan0
-3 --> this specifies the type of attack, in our case ARP-request
replay
-b ..... --> MAC address of access point
-h ..... --> MAC address of associated client from airodump
-x 50 --> limit to sending 50 packets per second
wlan0 --> our wireless network interface




Notes:
To test whether your nic is able to inject packets, you may want to try:
aireplay-ng -9 wlan0. You may also want to read the information available -here-.
To see all available replay attacks, type just: aireplay-ng



5. Crack WEP
(aircrack-ng)

WEP cracking is a simple process, only requiring
collection of enough data to then extract the key and connect to the network.
You can crack the WEP key while capturing data. In fact, aircrack-ng
will re-attempt cracking the key after every 5000 packets.

To attempt recovering the WEP key,
in a new terminal window, type:

aircrack-ng data*.cap (assuming your capture file is called
data...cap, and is located in the same directory)






Notes:
If your data file contains ivs/packets from different access points, you may be
presented with a list to choose which one to recover.
Usually, between 20k and 40k packets are needed to successfully crack a WEP key.
It may sometimes work with as few as 10,000 packets.



6. Crack WPA or WPA2 PSK
(aircrack-ng)

WPA, unlike WEP rotates
the network key on a per-packet basis, rendering the WEP method
of penetration useless. Cracking a WPA-PSK/WPA2-PSK key requires a dictionary
attack on a handshake between an access point and a client. What this means is,
you need to wait until a wireless client associates with the network (or
deassociate an already connected client so they automatically
reconnect). All that needs to be captured is the initial
"four-way-handshake" association between the access point and a
client. WPA
hashes the network key using the wireless access point's SSID as
salt. This prevents the statistical key-grabbing techniques that broke WEP, and
makes hash precomputation more dificult because the specific SSID
needs to be added as salt for the hash.

With all that said, the weakness of WPA-PSK
comes down to the passphrase. A short/weak passphrase makes it vulnerable to
dictionary attacks.

To successfully crack a WPA-PSK network, you
first need a capture file containing handshake data. This can be obtained using
the same technique as with WEP in step 3 above, using airodump-ng.

You may also try to deauthenticate an
associated client to speed up this process of capturing a handshake, using:

aireplay-ng --deauth 3 -a MAC_AP -c
MAC_Client (where MAC_IP
is the MAC
address of the access point, and MAC_Client is the MAC
address of an associated client).

Once you have captured a four-way handshake,
you also need a large/relevant dictinary file with common passphrases. See
related links below for some wordlist links.

You can, then execute the following command
in a linux terminal window (assuming both the dictionary file and captured data
file are in the same directory):

aircrack-ng -w
dictionary_file capture_file

Notes:
Cracking WPA-PSK and WPA2-PSK may take much longer, and will only succeed
with weak passphrases and good dictionary files.

Alternatively, there are tools like coWPAtty
that can use precomputed hash files to speed up dictionary attacks. Those hash
files can be very effective, but quite big in size. The Church of
WiFi has computed hash tables for the 1000 most common SSIDs against a
million common passphrases that are 7Gb and 33Gb in size...



Conclusion

As demonstrated above, WEP cracking
has become increasingly easier over the years, and what used to take hundreds
of thousands packets and days of capturing data can be accomplished
today within 15 minutes with a mere 20k data frames.

WPA/WPA2-PSK encryption
is holding its ground if using a strong, long key. However, weak
passphrases are vulnerable to dictionary attacks.