Home / Wireless / Easside-ng


Easside-ng Description

Easside-ng is an auto-magic tool which allows you to communicate via an WEP-encrypted access point (AP) without knowing the WEP key. It first identifies a network, then proceeds to associate with it, obtain PRGA (pseudo random generation algorithm) xor data, determine the network IP scheme and then setup a TAP interface so that you can communicate with the AP without requiring the WEP key. All this is done without your intervention.

Source: Easside-ng Wiki
Easside-ng Homepage | Kali aircrack-ng Repo

  • Author: Thomas d’Otreppe, Original work: Christophe Devine
  • License: GPLv2
easside-ng – auto-magic tool that lets you communicate via an WEP-encrypted AP without knowing the key
root@kali:~# easside-ng -h

  Easside-ng 1.2 rc4 – (C) 2007, 2008, 2009 Andrea Bittau

  Usage: easside-ng <options>


       -h                : This help screen
       -v   <victim mac> : Victim BSSID
       -m      <src mac> : Source MAC address
       -i           <ip> : Source IP address
       -r    <router ip> : Router IP address
       -s     <buddy ip> : Buddy-ng IP address (mandatory)
       -f        <iface> : Interface to use (mandatory)
       -c      <channel> : Lock card to this channel
       -n                : Determine Internet IP only

easside-ng Usage Example

First, run buddy-ng, then launch the Easside-ng attack, specifying as many of the options as you can.

root@kali:~# buddy-ng
Waiting for connexion
root@kali:~# easside-ng -v de:ad:be:ef:ca:fe -m 3c:46:d8:4e:ef:aa -s -f wlan0mon -c 6
Setting tap MTU
Sorting out wifi MAC

Leave a Reply

Your email address will not be published. Required fields are marked *


This site uses Akismet to reduce spam. Learn how your comment data is processed.


Check Also



makeivs-ng Description makeivs-ng is part of the aircrack-ng package and is used to generate an ...