Wireless pentest
Open network
Usually for guest access and only for internet
The guest can access it directly or they need to authenticate through a portal
WEP
This protocol has been completely broken for many years and should not be used anymore.
We can find the key very easily
WPA
2 authentication modes :
Personal = WPA PSK (Pre-Shared Key) = authentification by a secret shared with everyone (like at home)
Enterprise = WPA MGT (Management) = EAP (Extensible Authentication Protocol). It is possible to use several different EAP methods (see the official list on the IANA website) but here are the most common versions:
PEAP : historically the only protocol supported by Windows, transmits the credentials of the AD via an MSCHAPv2, thus allowing to recover a NetNTLMv2 hash through the Evil-Twin attack.
EAP-TTLS : very similar, can authenticate via login/password which can be recovered via the Evil-Twin attack if the clients do not check the certifcat of the access point.
EAP-TLS : mutual authentication by certificate.
The Hacking process
OR
Tools
Equipment
The following are equipment that can be used for wifi pentest
Wireless card Alfa AWUD036NH
Alfa AWUS1900
Alfa AWUS036ACH
Alfa AWUS052NH
Alfa AWUS051NH
Alfa AWUS036NHR
TP-Link TL-WN722N
Hak5 Pineapple Nano Basic
Flipper Zero along with the wifi dev board
Resources
Last updated