WiFi Workshop Exploitation Handbook - Wireless Hancking

CODEDRAGON Security

반응형

 

Missouri University of Science and Technology

ACM SIG-Security 2014 Wi-Fi Workshop

Exploitation Handbook 

20140201_wifi hacking_workshop.pdf


Table of Contents

Terms and Definitions……………………………………………………………………..……………………7

Getting to know Kali Linux……………………………………………………………………………………9

Initial Computer Setup……………………………………………………………………………………….10

Tools Used in this manual…………………………………………………………………………………..11

Finding the correct Wireless adapter……………………………………………………………….…13

Finding your MAC address………………………………………………………………………............14

Specifically changing your MAC address……………………………………………………………..15

Randomly changing your MAC address………………………………………………………………17

Changing your MAC address back the factory address……………………………………….19

Changing the channel of your wireless card…………………………………………….…………20

Operating Wi-Fi outside US regulation frequencies...............................................21

Operating your wireless card with more power ..........................….......................23

Finding the modes your wireless card supports………………………………………………….25

Operating your card in ad-hoc mode……………………………………………………………….…26

Operating your card in monitor mode………………………………………………………………..28

Data gathering in monitor mode………………………………………………………………………..29

Beacon Flooding…………………………………………………………………………………………………31

Viewing Probe Requests……………………………………………………………………………………..33

Passive Network Scan…………………………………………………………………………………………35

Active Network Scan…………………………………………………………………………………………..37

Directed Client Deauthentication ………………………………………………………………………38

Directed Network Deauthentication……………………………………………………..……………40

Multiple Network Deauthentication…………………………………………………………………..42

Forced connection to a specific access point………………………………………………………44

Breaking WEP Encryption……………………………………………………………………………………46

Breaking WPA Encryption with a dictionary list………………………………………………….50

Breaking WPA Encryption with a rainbow table………………………………………………….54

Computing personalized Rainbow Tables……………………………………………………………58

Breaking WPA Encryption by brute force……………………………………………………………60

Charts and Figures………………………………………………………………………………………………64