CODEDRAGON ㆍSecurity
Missouri University of Science and Technology
ACM SIG-Security 2014 Wi-Fi Workshop
Exploitation Handbook
20140201_wifi hacking_workshop.pdf
Table of Contents
Terms and Definitions……………………………………………………………………..……………………7
Getting to know Kali Linux……………………………………………………………………………………9
Initial Computer Setup……………………………………………………………………………………….10
Tools Used in this manual…………………………………………………………………………………..11
Finding the correct Wireless adapter……………………………………………………………….…13
Finding your MAC address………………………………………………………………………............14
Specifically changing your MAC address……………………………………………………………..15
Randomly changing your MAC address………………………………………………………………17
Changing your MAC address back the factory address……………………………………….19
Changing the channel of your wireless card…………………………………………….…………20
Operating Wi-Fi outside US regulation frequencies...............................................21
Operating your wireless card with more power ..........................….......................23
Finding the modes your wireless card supports………………………………………………….25
Operating your card in ad-hoc mode……………………………………………………………….…26
Operating your card in monitor mode………………………………………………………………..28
Data gathering in monitor mode………………………………………………………………………..29
Beacon Flooding…………………………………………………………………………………………………31
Viewing Probe Requests……………………………………………………………………………………..33
Passive Network Scan…………………………………………………………………………………………35
Active Network Scan…………………………………………………………………………………………..37
Directed Client Deauthentication ………………………………………………………………………38
Directed Network Deauthentication……………………………………………………..……………40
Multiple Network Deauthentication…………………………………………………………………..42
Forced connection to a specific access point………………………………………………………44
Breaking WEP Encryption……………………………………………………………………………………46
Breaking WPA Encryption with a dictionary list………………………………………………….50
Breaking WPA Encryption with a rainbow table………………………………………………….54
Computing personalized Rainbow Tables……………………………………………………………58
Breaking WPA Encryption by brute force……………………………………………………………60
Charts and Figures………………………………………………………………………………………………64
'Security' 카테고리의 다른 글
보안 개념 (0) | 2022.01.28 |
---|---|
Intel Security PasswordBox(패스워드 박스) 인수 (0) | 2014.12.18 |
최신 금융정보탈취 공격유형 (0) | 2014.09.23 |
패스워드 선택 및 이용 가이드 (0) | 2014.08.16 |
애플 스마트락(Smart Lock), 구글 퍼스널 언록킹(Personal unlocking) (0) | 2014.07.13 |