• 230 | Chapter 7: Wireless Security Testing
  • Learning Kali Linux




    Download 22,59 Mb.
    Pdf ko'rish
    bet207/225
    Sana14.05.2024
    Hajmi22,59 Mb.
    #232856
    1   ...   203   204   205   206   207   208   209   210   ...   225
    Bog'liq
    learningkalilinux

    Going Rogue | 229


    Figure 7-9. Captive login page from wifiphisher
    You’ll see that it looks respectable. It even has terms and conditions that you have to
    agree to. Once you have agreed to them, you are expected to provide your preshared
    key, otherwise known as the WiFi password, that is expected to authenticate you
    against the network. Meanwhile, the attacker running 
    wifiphisher
    is collecting the
    password, as you can see in 
    Example 7-14
    .
    Example 7-14. wifiphisher output while attacking
    Jamming devices:
    DHCP Leases:
    1520243113
    f4:0f:24:0b:5b:f1 10.0.0.43 lolagranola 01:f4:0f:24:0b:5b:f1
    HTTP requests:
    [
    *
    ]
    GET 10.0.0.43
    [
    *
    ]
    GET 10.0.0.43
    [
    *
    ]
    GET 10.0.0.43
    [
    *
    ]
    GET 10.0.0.43
    [
    *
    ]
    GET 10.0.0.43
    [
    *
    ]
    GET 10.0.0.43
    [
    *
    ]
    POST 10.0.0.43 wfphshr-wpa-password
    =
    mypassword
    230 | Chapter 7: Wireless Security Testing


    [
    *
    ]
    GET 10.0.0.43
    [
    *
    ]
    GET 10.0.0.43
    At the bottom of the output from 
    wifiphisher
    , you will see that a password has been
    entered. While this is just a bogus password that I entered to get through the page,
    any user thinking they were connecting to a legitimate network would presumably
    enter what they believed the password to that network to be. In this way, the attacker
    would get the password to the network. Additionally, since the 802.11 messages are
    passing at least to the rogue AP, the attacker gets any network communication being
    sent from the client. This may include attempts to log in to websites or mail servers.
    This can happen automatically without the client even knowing, depending on
    whether the clients or browser are running or if there are background processes set
    up. Once the password is sent through to the attacker, the client is presented with the
    page in 
    Figure 7-10
    .
    Figure 7-10. Firmware update page
    You will notice that the word 
    disconnect
    is misspelled on the page. There is also no
    copyright holder at the bottom, though there is a copyright date. It looks legitimate,
    though if you look closely, you will see that it’s entirely bogus. A typical user would
    likely not notice any of these issues. The entire point is to look legitimate enough to
    get users to believe they should be entering their passwords so the attacker can collect
    them.

    Download 22,59 Mb.
    1   ...   203   204   205   206   207   208   209   210   ...   225




    Download 22,59 Mb.
    Pdf ko'rish