Notice: Undefined variable: dd_override_start_anchor_id in /home/ijailbre/public_html/wp-content/plugins/digg-digg/digg-digg.php on line 351
Notice: Undefined variable: dd_override_top_offset in /home/ijailbre/public_html/wp-content/plugins/digg-digg/digg-digg.php on line 352
iWep Pro 5 is an application which, at least according to its Cydia page, is a password search tool for wireless routers. Supposedly it uses a form of key calculation on supported routers to crack the password, although I suspect it actually contains a library of default router passwords. This app could potentially be used for the purpose of gaining access to someone else’s private network, though the app contains a disclaimer that it’s meant for personal security use only.
Since I’m not a total scumbag, I plugged in my own TP-Link modem and wireless router, as provided to me by the National Capital FreeNet (two more days until I’m hooked up with dry DSL, sigh) and fired up the app. As it turns out, the router FreeNet provided me is not one of the devices “compatible” with iWep Pro, and shows up in a list of unsupported devices along with every router in my neighborhood.
According to the developers page for an old version of the software, iWep Pro doesn’t work when the router’s factory settings were changed. What does that mean, exactly? Does that pertain to the router’s default password? The default name of the router? And if so, how does the “WEP/WPA key calculation” factor into the software?
iWep PRO 5 is available in Cydia through the BigBoss repository and will tell you if your routers are supported by the exploit for free, however the app will only reveal your WEP/WPA key information for a “donation” of 5.50€ (about $7 US dollars). Since it doesn’t work with my router, or even any of the routers within WiFi range, I can’t vouch for the software.
Is your router more vulnerable than mine? Share your thoughts in the comments section below.