Professional Documents
Culture Documents
Asleap Is A Tool Designed To Recover Weak LEAP
Asleap Is A Tool Designed To Recover Weak LEAP
asleap Main:
asleap is a tool designed to recover weak LEAP (Cisco's Lightweight Extensible Authentication Protocol) and PPTP
Linux passwords, asleap can perform:
FC6 Build Howto Plus many more features, see the project homepage
Live Linux Distros Download latest stable code from http://asleap.sourceforge.net/ to /tools/wifi
Search make
Windows
Using asleap:
WIN32 tools, Howtos
The first step involved in the use of asleap is to produce the necessary database (.dat) and index files (.idx). See
Tools Index asleap README for a full description as to why these files are required.
cd /tools/wifi/asleap
./genkeys
General
Miscellaneous WI-FI
Rogue AP Howtos
WI-FI Certifications
802.11 Standards
Formats / Extensions
Useful Links
./genkeys -r dict -f dict.dat -n dict.idx
dict.dat = Our new output pass+hash file (generated as a result of running this command)
dict.idx = Our new output index filename (generated as a result of running this command)
http://wirelessdefence.org/Contents/AsleapMain.htm 9/14/2008
Asleap Main Page Page 2 of 3
asleap options:
The final step in recovering our weak LEAP password is to run the asleap command with our newly created .dat
and .idx files:
leap.dump = Our libpcap packet capture file (NOTE: Any libpcap (e.g. tcpdump, Wireshark) or AiroPeek capture file
(.apc) can be used)
dict.dat = Our output pass+hash file (generated with genkeys, see above)
dict.idx = Our new output index filename (generated with genkeys, see above)
http://wirelessdefence.org/Contents/AsleapMain.htm 9/14/2008
Asleap Main Page Page 3 of 3
As you can see from the output above, our user name = qa_leap and our password = qaleap
Note: The screenshots and data files used above are all provided within the asleap tool itself (located
in /asleap/data).
http://wirelessdefence.org/Contents/AsleapMain.htm 9/14/2008