Cracking WPA/WPA2 with Non-Dictionary Attacks
Upcoming SlideShare
Loading in...5
×
 

Cracking WPA/WPA2 with Non-Dictionary Attacks

on

  • 32,646 views

null Pune Chapter - September 2012 Meet

null Pune Chapter - September 2012 Meet

Statistics

Views

Total Views
32,646
Views on SlideShare
31,987
Embed Views
659

Actions

Likes
3
Downloads
305
Comments
3

1 Embed 659

http://null.co.in 659

Accessibility

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
  • Slide 23 is incorrect. The WPS PIN is split into two halves. Thankfully, the wireless access point will let you know when you have guessed either half of the pin. The actual number of possible PIN permutations is about 11,000, not 100,000,000
    Are you sure you want to
    Your message goes here
    Processing…
  • hi
    Are you sure you want to
    Your message goes here
    Processing…
  • bright!!!!
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Cracking WPA/WPA2 with Non-Dictionary Attacks Cracking WPA/WPA2 with Non-Dictionary Attacks Presentation Transcript

  • BySwaroop YermalkaR
  • Changing the worldthrough WirelessCommunication!
  • Dj Akhil Talreja View slide
  • DlinkBT5 r3 laptop with wifi router Galaxy card pop View slide
  • Simple WPA/2 Cracking TechniqueBrute-Force attackUnderstanding WPS [ Wi-Fi Protected Setup ]Exploring Reaver
  • 1. Start Sniffing2. Capture WPA Handshake3. Apply Dictionary4. Crack the password!
  • Supplicant Authenticator Probe req,resp Authentication RR, Association RRPre-shared key 256bit Pre-shared key 256bitSnounce PTK PTK Message 2 Snounce + MIC Message 4 Key install Acknowledgement Source: securitytube.net
  • Step 1Step 2
  • Step 3 Step 4
  • 1. Monitor air for a new client trying to associate with the access point (passive)
  • 2. De-authentication one or all clients and monitor reconnection (active)Legitimateclient AP De-authentication Packet
  • Source: http://lastbit.com/pswcalc.asp
  • Wi-Fi Protected Setup (WPS; originally Wi-Fi Simple Config) is a computingstandard that attempts to allow easy establishment of a secure wireless home network.Created by the Wi-Fi Alliance and introduced in 2007, the goal of the protocol is toallow home users who know little of wireless security and may be intimidated by theavailable security options to set up Wi-Fi Protected Access, as well as making it easyto add new devices to an existing network without entering long passphrases. Source: wikipedia
  • Reaver is fantastic tool to crack this WPS pin written by Craig Heffner.It performs a brute force attack against the AP, attempting every possiblecombination in order to guess the APs 8 digit pin number.Since the pin numbers are all numeric, there are 10^8 (100,000,000) possible valuesfor any given pin number. Source: Tactical Network Solutions articles
  • …use pin as master key!n0nEc@nhaCkthi$pa$sw0rd!!!
  • Keep non-dictionary, combination of symbols, digits and numbers. Ex: R0ck$t@R
  • 1. Tactical Network Solutions2. WiFi Security Megaprimer by Vivek Ramchandran
  • Feedback, questions and suggestions: swaroop.wireless@gmail.comSwaroop D. YermalkaR