Password Cracking on WiFi | 219




Download 22,59 Mb.
Pdf ko'rish
bet199/225
Sana14.05.2024
Hajmi22,59 Mb.
#232856
1   ...   195   196   197   198   199   200   201   202   ...   225
Bog'liq
learningkalilinux

Password Cracking on WiFi | 219


Authentication Code Protocol, Counter Mode CBC-MAC Protocol, or CCM mode
protocol (CCMP). Unfortunately, the one that is using WPA and not WPA2 is not
one of my networks, so I can’t do any testing on it. Instead, we’re going to be using an
AP I own that isn’t being used for anything other than testing. We’ll use 
besside-ng
to
attempt to crack the authentication for that BSSID. You need to use -b with the
BSSID, as you can see in 
Example 7-7
. You also need to specify the interface used.
You’ll see 
wlan0mon
is used, but in order to use it, I stopped 
airmon-ng
.
Example 7-7. Using besside-ng to automatically crack passwords
yazpistachio:root~# besside-ng -b 50:C7:BF:82:86:2C wlan0mon
[
19:55:52
]
Let
'
s ride
[
19:55:52
]
Resuming from besside.log
[
19:55:52
]
Appending to wpa.cap
[
19:55:52
]
Appending to wep.cap
[
19:55:52
]
Logging to besside.log
UNHANDLED MGMT 10cking 
[
TP-Link_862C
]
WPA - PING
UNHANDLED MGMT 10cking 
[
TP-Link_862C
]
WPA - PING
UNHANDLED MGMT 10cking 
[
TP-Link_862C
]
WPA - PING
UNHANDLED MGMT 10cking 
[
TP-Link_862C
]
WPA - PING
UNHANDLED MGMT 10cking 
[
TP-Link_862C
]
WPA - PING
UNHANDLED MGMT 10cking 
[
TP-Link_862C
]
WPA - PING
UNHANDLED MGMT 10cking 
[
TP-Link_862C
]
WPA - PING
[
19:55:59
]

Attacking 
[
TP-Link_862C
]
WPA - DEAUTH
You’ll see from the example that 
besside-ng
is sending a 
DEAUTH
. This is a deauthen‐
tication message. It’s used to force clients to reauthenticate in order to collect the
authentication message. Once the authentication message has been collected, the pro‐
gram can perform a brute-force attack in order to determine the passphrase or
authentication credentials used. We are attacking a WPA2-encrypted network, but if
we had found a WEP-encrypted network, we could have used 
wesside-ng
.
A deauthentication attack can also be used as a denial of service. By
injecting deauthentication messages to the network, an attacker can
force a client off the network. By continually repeating the deau‐
thentication message, the client may be stuck in an authentication/
deauthentication cycle and never be able to get on the network.
coWPAtty
Another program we can use to try to crack passwords is 
cowpatty
. This is styled
coWPAtty
, to make it clear it’s an attack against WPA passwords. What 
cowpatty
needs in order to crack the password is a packet capture that contains the four-way
handshake used to set up the encryption key for encrypting the transmission between
the AP and the station. You can get a packet capture including the relevant frames by
using 
airodump-ng
or 
kismet
. Either will generate a packet capture file (
.cap
or 
.pcap
)

Download 22,59 Mb.
1   ...   195   196   197   198   199   200   201   202   ...   225




Download 22,59 Mb.
Pdf ko'rish