Ethical Hacking and Penetration Testing Guide ( PDFDrive )
11 Wireless Hacking .....................................................................................................291 Introduction ...................................................................................................................291
Requirements ..................................................................................................................291
Introducing Aircrack-ng ..................................................................................................293
Uncovering Hidden SSIDs .............................................................................................293
Turning on the Monitor Mode ...................................................................................... 294
Monitoring Beacon Frames on Wireshark ..................................................................... 294
Monitoring with Airodump-ng ...................................................................................... 295
Speeding Up the Process ................................................................................................ 296
Bypassing MAC Filters on Wireless Networks ...................................................... 296
Cracking a WEP Wireless Network with Aircrack-ng .......................................... 298
Placing Your Wireless Adapter in Monitor Mode ........................................................... 298
Determining the Target with Airodump-ng................................................................... 299
Attacking the Target ............................................................................................. 299
Speeding Up the Cracking Process ....................................................................... 300
Injecting ARP Packets .......................................................................................... 300
Cracking the WEP ................................................................................................301
Cracking a WPA/WPA2 Wireless Network Using Aircrack-ng ..................................... 302
Capturing Packets .......................................................................................................... 303
Capturing the Four-Way Handshake ............................................................................. 303
Cracking WPA/WAP2 .................................................................................................. 304
Using Reaver to Crack WPS-Enabled Wireless Networks .................................... 305
Reducing the Delay ....................................................................................................... 306
Further Reading ............................................................................................................ 306
Setting Up a Fake Access Point with SET to PWN Users ..................................... 306
Attack Scenario .............................................................................................................. 309
Evil Twin Attack ....................................................................................................310
Scanning the Neighbors ..................................................................................................311
Spoofing the MAC..........................................................................................................311
Setting Up a Fake Access Point .......................................................................................311
Causing Denial of Service on the Original AP ................................................................311
Conclusion ......................................................................................................................312