First of all, I must start out by saying that this app is for learning purposes only. Hacking is evil and only you take responsibility for your actions on this “Nokia N900 Hacks” post. Neighbouring networks are not free game, and this should only be used on your own network. With that, I have recently been playing around with Cleven for Nokia N900, a GUI for aircrack-ng, which is a wireless security testing tool. Aircrack-ng is something that I shyed away from previously, mainly due to effort and my love for pictures. Cleven has resolved both of these issues, so now here we are.
Cleven is very straightforward to use, simply enable to options, scan, and your away. Aircrack-ng works for WEP on the basis of capturing encrypted packets. Once enough packets have been collected it is able to decipher the password. Most people know that WEP is a very weak security standard, and it didn’t take long for my N900 to tell me what the password I set was. WPA is a far more secure standard, and a dictionary approach is used. After running this for a reasonable amount of time, I was unable to crack my security once switched over to WPA, which is a good thing.
A minor note is that the data retrieved is saved and takes up space, if left too long it can fill up your whole opt folders, which is bad and may or may not have happened to me. Once you have gotten the information you want, it’s good to delete the files from the options menu.
This experiment has shown me one thing, that WEP is terrible. That’s all I was really interested in going into this; Cleven and Aircrack-ng showed me this amazingly. Its one thing to be told something, it’s another entirely to actually try it for yourself. If you want me to tell you something, it’s that if you are still using WEP on your router, change it now.