Introduction

Untitled

Wireless network

WPA2 PSK : Home / small business

WPA2 Enterprise : Big companies but difficult to setup

Activities performed

Evaluating strength of PSK, capturing handshake to try to crack password

Reviewing nearby network find where we can network, network that should shows up (printer, iot), rogue network

Guess network segmentation

Checking network access

Tools

To efficiently perform wireless pentesting, built-in wifi card isn’t enough, recommended to use external like ALFA Pentesting wireless chipset

WPA2 PSK hacking process

Untitled

<aside> 💸 Buy a chip :/

</aside>

002_WPA_PS2_Exploit_Walkthrough

Check the chip is connected with iwconfig

Set the card to monitor mode

airmon-ng check kill : remove blocking process

airmon-ng start <tool> : start monitoring

Search the area

airodump-ng <tool> : list the accessible wifi

POWER (PWR) : from -1 , close to -inf , far

Channel : look this

Capture handshake

airodump-ng -c <channel> --bssid <bssid> -w capture <filename> : when testing we see connected devices

Untitled

De-auth attack to capture faster

aireplay-ng -0 1 -a <macaddress of connected>