Projects / Weplab


Weplab is a tool to review the security of WEP encryption in wireless networks from an educational point of view. Several attacks are available, so it can measure the effectiveness and minimum requirements of each one. Currently, weplab supports several methods, and it is able to crack the WEP key from 600,000 encrypted packets.

Operating Systems

Recent releases

  •  18 Jul 2005 21:03

    Release Notes: A bug with small packets (like arp) has been fixed. The minimun size has been decreased to 20 bytes. This release works like a charm with an arp replay attack. It prints the right ASCII password when a WEP key is cracked using the dictionary mode.

    •  06 Mar 2005 11:31

      Release Notes: A bug in bruteforge.c was fixed, and a new way to coordinate multiple process cracking was implemented. Another bug in bruteforge.c was fixed to allow --ascii to go up to 0x7F. Support was added for --alpha (only letters) and --alnum (letters and numbers) in the bruteforce attack. wlan0 is now the default interface for capturing packets. Pressing "q" now quits sniffing and flushes the pcap file. Help for command line parameters was simplified. Some divide by 0 bugs were fixed. The --wordfile option was added to make it possible to launch the dictionary based attack without using John the Ripper to generate words.

      •  10 Dec 2004 04:32

        Release Notes: This release fixes a bug with those WEP keys which have a 0xFF byte value, a bug that made Weplab show the wrong BSSID with --analyze, and a problem with --ascii in bruteforce attack. There is now a manual page. Minor bugs were fixed related to console printed messages.

        •  11 Sep 2004 12:36

          Release Notes: The default options for statistical attacks have changed and are now [ -s 3 --perc 50 ]. The commandline options are now more relaxed and robust. A PRISM_HEADER datalink has been added for capture packets. This release has been tested and works fine with John The Ripper 1.6.

          •  09 Sep 2004 16:02

            Release Notes: BSSID is automatically detected and selected if it is not specified with --bssid. The "analyze" switch (-a) now shows all packets per BSSID. Big endian issues fixed. Small fixes were made for the Windows platform. A small bug was fixed with rc4 decryption. A small change was made to Korek inverse attack.

            Recent comments

            29 Aug 2004 09:54 topolb

            Re: Timestamp

            > Whoever uploaded the tarball to

            > SourceForge, you're system time is set

            > for September. People can't compile the

            > program. Fix it.

            Yes, it was my fault. However a simple touch * fixes it.

            New release 0.0.9 fixes it. New great improvements (full Korek's attacks) are available, so now it is possible to crack the key using even less packets.

            27 Aug 2004 14:08 bigjnsa

            Whoever uploaded the tarball to SourceForge, you're system time is set for September. People can't compile the program. Fix it.


            Project Spotlight


            A Fluent OpenStack client API for Java.


            Project Spotlight

            TurnKey TWiki Appliance

            A TWiki appliance that is easy to use and lightweight.