• WiFi Attacks and Testing Tools | 215
  • part, this is because of legacy requirements. There may be hardware that can’t be




    Download 22,59 Mb.
    Pdf ko'rish
    bet196/225
    Sana14.05.2024
    Hajmi22,59 Mb.
    #232856
    1   ...   192   193   194   195   196   197   198   199   ...   225
    Bog'liq
    learningkalilinux


    part, this is because of legacy requirements. There may be hardware that can’t be
    replaced that supports only the older mechanisms. If you have a working network
    setup, why change it, after all? Therefore, it’s worth performing testing against some
    of these mechanisms.
    Kali includes one program that can be used to test WiFi networks automatically using
    various techniques. 
    wifite
    can test WPA, WEP, and WPS-enabled APs. While you can
    test each of those specifically, you can also run 
    wifite
    without any parameters and
    have it test all of these mechanisms. 
    Figure 7-4
     shows 
    wifite
    running. In order to run,
    it places the interface in monitor mode. This is necessary to be able to get the radio
    traffic it needs to perform the testing. What’s interesting about this run, aside from
    one of the SSIDs, is that all of the BSSIDs indicate that WPS is not enabled, which is
    not true for at least two of them.
    An ESSID is an 
    extended service set identifier
    . In some cases, the
    BSSID will equal the ESSID. However, in larger networks where
    there may be multiple APs, the ESSID will be different from the
    BSSID.
    WiFi Attacks and Testing Tools | 215


    Figure 7-4. Using wifite to gather BSSIDs
    Figure 7-4
    shows the list of APs that have been identified. Once you have that list, you
    need to select the APs you want to test. Once you have the SSID you want to test
    against showing in the list, you press Ctrl-C to have 
    wifite
    stop looking for networks.
    You then select a device from the list or you can select all. 
    Example 7-3
     shows 
    wifite
    starting testing against all the APs.
    Example 7-3. wifite running tests
    [
    +
    ]
    select
    target numbers 
    (
    1-5
    )
    separated by commas, or 
    'all'
    : all
    [
    +
    ]
    5
    targets selected.
    [
    0:08:20
    ]
    starting wpa handshake capture on 
    "CasaChien"
    [
    0:08:09
    ]
    sending 
    5
    deauth to *broadcast*...
    As mentioned, 
    wifite
    uses various strategies by default. In addition to trying to cap‐
    ture the handshake required by WPA, as you can see in 
    Example 7-3

    wifite
    will also
    take a pass at running the Pixie Dust attack. You can see attempts to run that attack
    against the APs that have WPS enabled in 
    Figure 7-5
    . You will also note there that
    wifite
    was able to capture the WPA handshake, which it saved as a pcap file for later
    analysis.
    This will run for a while, attempting to trigger the vulnerabilities that exist against the
    encryption and authentication mechanisms supported. Because all five targets were
    selected, it will take quite a bit longer than if I were just testing one of the devices. To
    run these tests, 
    wifite
    needs to send frames that wouldn’t be part of the normal pro‐
    cess. Other tools do similar things by injecting traffic into the network in order to
    watch the responses from the network devices. This may be essential in trying to
    gather enough traffic for analysis.

    Download 22,59 Mb.
    1   ...   192   193   194   195   196   197   198   199   ...   225




    Download 22,59 Mb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    part, this is because of legacy requirements. There may be hardware that can’t be

    Download 22,59 Mb.
    Pdf ko'rish