Skip to content

NXNJZ

Linux and Security

  • BLOG
  • Cowsay Fortune
  • Contact
  • Gitlab
  • Company Homepage

Wifi

Posted on June 20, 2018 - August 20, 2018 by nxnjz

Basics

If you don’t know much about wireless networking, I highly recommend you read this introduction. And read this to learn the very basics of wifi security.

There are four main ways of obtaining a wifi password:

  1. WEP cracking.
  2. WPA/WPA2 wordlist/bruteforce attack.
  3. WPS bruteforce / Pixie Dust.
  4. Evil Twin Access Point. This involves social engineering.

What you should know before getting started

  • There are many compatibility issues between drivers, wifi chipsets, etc. You will need to choose a wifi card carefully if you want it to work.
  • Distance matters. The farther away a target is, the harder it is to successfully attack it. A more powerful wireless card with a high gain antenna is always helpful. Some wireless cards allow you to set their transmission power. Video Demo here.
  • Each target is different. You can’t expect something that works on a particular brand/model/firmware to work on any other brand/model/firmware. This is true for both access points and wifi cards.
  • A password is not always enough to gain access. For example, MAC filtering may still prevent you from connecting, even though you have the correct password. MAC spoofing can usually bypass that.
  • There are many, many tools available.  Some will do everything for you automatically and may even have a nice graphical interface, others will require more skill and command-line knowledge. The latter group is more effective and flexible when employed successfully. The same goal can always be achieved using different tools.

 

Tutorials for Noobs

I will only list here popular methods using popular tools. If you’re familiar with the usual methods, skip this part.

Choose the one that suits you best.

WEP:

  • Using the aircrack-ng suite. (CLI)
  • Using besside-ng. This tool automates a few steps. (CLI)
  • Using Fern. (GUI)

WPA:

  • Using the aircrack-ng suite. (CLI)
  • Using Wifite. This tool automates many steps. (CLI)

WPS:

  • Using Reaver. (CLI)
  • Using Bully. (CLI)

 

 

Posted in Wifi

Post navigation

WebShells
Increase the transmission power of a wifi card/adapter (txpower.)

2 Comments

  1. router login says:
    October 25, 2018 at 11:17 pm

    Wow, fantastic blog format! How long have you been blogging for?
    you make running a blog glance easy. The entire glance of your site is wonderful,
    as well as the content!

    Reply
  2. default password says:
    October 27, 2018 at 12:05 am

    Thanks for another magnificent article. The place else
    may anyone get that type of info in such a perfect manner of
    writing? I’ve a presentation next week, and I
    am at the look for such info.

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • CVE-2021-42052 full disclosure
  • How to Set Up an Interactive SSH Honeypot on CentOS 8.
  • HackTheBox.eu Jarvis Writeup
  • How to setup a simple proxy server with tinyproxy (Debian 10 Buster)
  • How to Install qdPM 9.1 on Debian 10 LEMP

Tags

802.11 ampache apache aspx bash cd centos cms crm cve debian exploits fedora fulldisclosure hackthebox honeypot http httpd ifconfig iw iwconfig labs lfi linux mariadb memory monit music nginx pastebin php privatebin privesc project management proxy reconnoitre selinux shopt ssh systemd txpower ubuntu wallabag wireless xxe

Categories

  • BASH (1)
  • CTF/Labs (2)
  • CVE / full disclosure (1)
  • Information Gathering (1)
  • Linux (25)
  • Password Cracking (1)
  • Privilege Escalation (2)
  • SQL Injection (1)
  • Web-Shells (1)
  • Wifi (2)
  • XXE (1)

Recent Comments

  • Bernard Martiny on How to Install PrivateBin on Ubuntu 18.04 LTS
  • VuCSA on List of security labs/challenges/CTFs
  • Brian on How to Install PrivateBin on Fedora 29.
  • Tyreeb on Installing Ampache on CentOS 7.
  • Christian Mora on Installing Ampache on CentOS 7.