Ethical Hacking and Penetration Testing Guide


  Wireless Hacking .....................................................................................................291



Yüklə 22,44 Mb.
Pdf görüntüsü
səhifə12/235
tarix07.08.2023
ölçüsü22,44 Mb.
#138846
1   ...   8   9   10   11   12   13   14   15   ...   235
Ethical Hacking and Penetration Testing Guide ( PDFDrive )

 11 
Wireless Hacking .....................................................................................................291
Introduction ...................................................................................................................291
Requirements ..................................................................................................................291
Introducing Aircrack-ng ..................................................................................................293
Uncovering Hidden SSIDs .............................................................................................293
Turning on the Monitor Mode ...................................................................................... 294
Monitoring Beacon Frames on Wireshark ..................................................................... 294
Monitoring with Airodump-ng ...................................................................................... 295
Speeding Up the Process ................................................................................................ 296
Bypassing MAC Filters on Wireless Networks ...................................................... 296
Cracking a WEP Wireless Network with Aircrack-ng .......................................... 298
Placing Your Wireless Adapter in Monitor Mode ........................................................... 298
Determining the Target with Airodump-ng................................................................... 299
Attacking the Target ............................................................................................. 299
Speeding Up the Cracking Process ....................................................................... 300
Injecting ARP Packets .......................................................................................... 300
Cracking the WEP ................................................................................................301
Cracking a WPA/WPA2 Wireless Network Using Aircrack-ng ..................................... 302
Capturing Packets .......................................................................................................... 303
Capturing the Four-Way Handshake ............................................................................. 303
Cracking WPA/WAP2 .................................................................................................. 304
Using Reaver to Crack WPS-Enabled Wireless Networks .................................... 305
Reducing the Delay ....................................................................................................... 306
Further Reading ............................................................................................................ 306
Setting Up a Fake Access Point with SET to PWN Users ..................................... 306
Attack Scenario .............................................................................................................. 309
Evil Twin Attack ....................................................................................................310
Scanning the Neighbors ..................................................................................................311
Spoofing the MAC..........................................................................................................311
Setting Up a Fake Access Point .......................................................................................311
Causing Denial of Service on the Original AP ................................................................311
Conclusion ......................................................................................................................312

Yüklə 22,44 Mb.

Dostları ilə paylaş:
1   ...   8   9   10   11   12   13   14   15   ...   235




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin