Wireless Access Exploitation
Misc. Wireless Access Exploitation Tools
- Aircrack-ng Suite
- Aircrack-ng
- Aireplay-ng
- Airodump-ng
tshark [options] ...to dump and analyze network traffic.capinfos [options] <infile> ...to print information about capture files.captype [options] <infile> ...to print types of capture files.dumpcap [options] ...to dump network traffic.mmdbresolve -f db_file [-f db_file ...]to read IPv4 and IPv6 addresses and print their IP geolocation information.text2pcap [options] <infile> <outfile>to generate a capture file from an ASCII hexdump of packets.- Wireshark
wireshark [options] ... [ <infile> ]to interactively dump and analyze network traffic.
Misc. Wireless Access Exploitation Resources
- CryptoKait article: Secret Information in Network Traffic Logs: NTA for NCL
- Packet Dissection: write your own dissector
Aircrack-ng Suite
Aircrack-ng
Aircrack-ng is an 802.11 WEP and WPA/WPA2-PSK key cracking program.
- Usage:
aircrack-ng [options] <capture file(s)> - Common options
-nto specify key length in WEP cracking.
- WEP and WPA-PSK cracking options
-w(param: words) : Path to a wordlist or “-“ without the quotes for stdin. Separate multiple wordlists by comma.
- To find the WEP network security key (password):
aircrack-ng -a1 <capture file>
Aireplay-ng
Airplay-ng is part of the Aircrack-ng Suite; it is used to inject frames. Its primary function is to generate traffic for the later use in aircrack-ng for cracking the WEP and WPA-PSK keys.
- Attacks Implemented:
- Attack 0: Deauthentication (flag:
-0) - Other attack types (1-9) listed on Airplay-ng documentation website.
- Attack 0: Deauthentication (flag:
- Usage:
aireplay-ng <options> <replay interface> - Filter Options:
-b bssid: MAC address, Access Point-d dmac: MAC address, Destination-s smac: MAC address, Source- additional options in documentation.
- Replay Options:
-x nbpps: number of packets per second-p fctrl: set frame control word (hex)-a bssid: set Access Point MAC address-c dmac: set Destination MAC address-h smac: set Source MAC address- additional options in documentation.
Aerodump-ng
Airodump-ng is used for packet capture, capturing raw 802.11 frames.
- Options in documentation.
- Filter options
--encrypt <suite>: Filter APs by cipher suite--netmask <netmask>: Filter APs by mask--bssid <bssid>: Filter APs by BSSID--essid <essid>: Filter APs by ESSID--essid-regex <regex>: Filter APs by ESSID using a regular expression-a: Filter unassociated clients- additional filter options in documentation.
Wireshark
- This CryptoKait Article describes some of the basics.
Symmetric Encryption Summary
Below are several important symmetric algorithms and their basic characteristics. | Algorithm | Method | Key Size | |———–|———————-|————————–| | AES | 128-bit block cipher | 128, 192, or 256-bit key | | 3DES | 64-bit block cipher | 56, 112, or 168-bit key | | Blowfish | 64-bit block cipher | 32 to 448-bit key | | Twofish | 128-bit block cipher | 128, 192, or 256-bit key | | RC4 | Stream cipher | 40 to 2048-bit key | | DES | 64-bit block cipher | 56-bit key |