PENTESTING
BY HENRIK JACOBSEN
I AM NOT A NETWORK
SPECIALIST, NOR AM I
EDUCATED IN NETWORKING.
Henrik Jacobsen
DISCLAIMER
ABOUT ME
HENRIK JACOBSEN
▾ Age: 32 or 100000
▾ Graduate in computer science,
computer scientist
▾ 7œ+ years experiance with software
development
▾ Currently: Prosa - as Political
Consultant
▾ Mantra: KISS!
▾ Interested in Pentesting and Privacy/
Encryption!
TODAYS TOPICS
▾ WiFi 101
▾ Pen testing by using a pineapple with demoes
▾ Learning vulnerabilities in practice
▾ Rogue networking in practice
▾ WPS hacking
▾ Intro to kali Linux
WIFI 101
BASIC UNDERSTANDING OF IEEE 802.11 / WIFI ON 2.4 GHZ
▾ operating in 3 modes: Master, managed and monitor.
▾ Radio Frequenze MONitor - RFMON, passively monitor
▾ Protocols: 802.11a/b/g/n/ac - frequenzy(Channel 1: 2.4
GHZ to 2.422 GHZ, etc.), data rate, bandwidth(upper and
lower frequenscies og channel), modulation (OFDM -
Orthogonal Frequenzy-division Multiplexing / digital
encoding technic) and range.
WIFI 101
CHANNELS:1-14
▾ Channel 1-13 allowed in EU
▾ 1-6-11 are not overlapping.
▾ Note: Always try use non-overlapping than your
surrounding / neighbours
WIFI 101
FRAMES, FRAME STRUCTURE AND FRAME TYPES
▾ Everything transmitted by 802.11 is in frame form
▾ MAC header, Payload and frame check sequence
▾ Control-, Data- and Management Frames:
▾ Beacon, Probe, Association and Authentication Frames.
WIFI PINEAPPLE
▾ Started on Fon router
▾ Developed to the new version
▾ Has the most popular tools from‹
Kali linux pre-installed.
▾ A lot easier to use and low power-‹
consumption makes it ideal to hide‹
and then track or hack.
A PENETRATION TEST, OR SOMETIMES
PENTEST, IS AN ATTACK ON A
COMPUTER SYSTEM THAT LOOKS FOR
SECURITY WEAKNESSES,
Wikipedia - Link:https://en.wikipedia.org/wiki/Penetration_test
PENTESTING
ROGUE NETWORKING
▾ In the demo showen before.
▾ Intelligence gathering, and then deploying networks.
▾ If the Pineapple deploy a network that is un-encrypted,
then WiFi equipment will connect to pineapple.
▾ OR - via kali linux, making Evil Twin attack.‹
(cloning the target AP SSID, Deauth clients and then
HiJacking them).
LEARNING VULNERABILITIES IN PRACTICE
HOW TO SECURE YOUR NETWORK?!?
▾ Use WPA2 encryption, it's not bullet proff - but it works.
▾ Use complex WiFi Key - like a real password.
▾ Disable WPS "Wi-Fi Protected Setup".
▾ Change the SSID to some none related to you and
different from router brand.
▾ Consider MAC ïŹltering.
▾ Regular check logs and settings.
A ROGUE ACCESS POINT IS A WIRELESS
ACCESS POINT THAT HAS BEEN INSTALLED
ON A SECURE NETWORK WITHOUT EXPLICIT
AUTHORIZATION FROM A LOCAL NETWORK
ADMINISTRATOR.
Wikipedia - Link:https://en.wikipedia.org/wiki/Rogue_access_point
ROGUE ACCESS POINT
WPS HACKING
▾ Only possible on AP's from 2006 to 2012
▾ Bully or Reaver will get the PIN on 3-6 hour.
▾ Pineapple can run both.
▾ Kali linux has both installed
▾ WASH can detect all WPS enabled networks in your area
KALI LINUX
WHAT IS KALI LINUX?
▾ Formerly known as BackTrack - based on ubuntu
▾ Debian-derived digital forensics and pentesting OS
▾ Preloaded with over 300 penetration-testing programs
▾ Highlights: Metasploit, Aircrack-ng, Wireshark, Airodump-
ng, kismet and Social Engineering Toolkit.
LAN TURTLE

Pentesting

  • 1.
  • 2.
    I AM NOTA NETWORK SPECIALIST, NOR AM I EDUCATED IN NETWORKING. Henrik Jacobsen DISCLAIMER
  • 3.
    ABOUT ME HENRIK JACOBSEN ▾Age: 32 or 100000 ▾ Graduate in computer science, computer scientist ▾ 7œ+ years experiance with software development ▾ Currently: Prosa - as Political Consultant ▾ Mantra: KISS! ▾ Interested in Pentesting and Privacy/ Encryption!
  • 4.
    TODAYS TOPICS ▾ WiFi101 ▾ Pen testing by using a pineapple with demoes ▾ Learning vulnerabilities in practice ▾ Rogue networking in practice ▾ WPS hacking ▾ Intro to kali Linux
  • 5.
    WIFI 101 BASIC UNDERSTANDINGOF IEEE 802.11 / WIFI ON 2.4 GHZ ▾ operating in 3 modes: Master, managed and monitor. ▾ Radio Frequenze MONitor - RFMON, passively monitor ▾ Protocols: 802.11a/b/g/n/ac - frequenzy(Channel 1: 2.4 GHZ to 2.422 GHZ, etc.), data rate, bandwidth(upper and lower frequenscies og channel), modulation (OFDM - Orthogonal Frequenzy-division Multiplexing / digital encoding technic) and range.
  • 6.
    WIFI 101 CHANNELS:1-14 ▾ Channel1-13 allowed in EU ▾ 1-6-11 are not overlapping. ▾ Note: Always try use non-overlapping than your surrounding / neighbours
  • 7.
    WIFI 101 FRAMES, FRAMESTRUCTURE AND FRAME TYPES ▾ Everything transmitted by 802.11 is in frame form ▾ MAC header, Payload and frame check sequence ▾ Control-, Data- and Management Frames: ▾ Beacon, Probe, Association and Authentication Frames.
  • 8.
    WIFI PINEAPPLE ▾ Startedon Fon router ▾ Developed to the new version ▾ Has the most popular tools from‹ Kali linux pre-installed. ▾ A lot easier to use and low power-‹ consumption makes it ideal to hide‹ and then track or hack.
  • 9.
    A PENETRATION TEST,OR SOMETIMES PENTEST, IS AN ATTACK ON A COMPUTER SYSTEM THAT LOOKS FOR SECURITY WEAKNESSES, Wikipedia - Link:https://en.wikipedia.org/wiki/Penetration_test PENTESTING
  • 11.
    ROGUE NETWORKING ▾ Inthe demo showen before. ▾ Intelligence gathering, and then deploying networks. ▾ If the Pineapple deploy a network that is un-encrypted, then WiFi equipment will connect to pineapple. ▾ OR - via kali linux, making Evil Twin attack.‹ (cloning the target AP SSID, Deauth clients and then HiJacking them).
  • 12.
    LEARNING VULNERABILITIES INPRACTICE HOW TO SECURE YOUR NETWORK?!? ▾ Use WPA2 encryption, it's not bullet proff - but it works. ▾ Use complex WiFi Key - like a real password. ▾ Disable WPS "Wi-Fi Protected Setup". ▾ Change the SSID to some none related to you and different from router brand. ▾ Consider MAC ïŹltering. ▾ Regular check logs and settings.
  • 13.
    A ROGUE ACCESSPOINT IS A WIRELESS ACCESS POINT THAT HAS BEEN INSTALLED ON A SECURE NETWORK WITHOUT EXPLICIT AUTHORIZATION FROM A LOCAL NETWORK ADMINISTRATOR. Wikipedia - Link:https://en.wikipedia.org/wiki/Rogue_access_point ROGUE ACCESS POINT
  • 14.
    WPS HACKING ▾ Onlypossible on AP's from 2006 to 2012 ▾ Bully or Reaver will get the PIN on 3-6 hour. ▾ Pineapple can run both. ▾ Kali linux has both installed ▾ WASH can detect all WPS enabled networks in your area
  • 15.
    KALI LINUX WHAT ISKALI LINUX? ▾ Formerly known as BackTrack - based on ubuntu ▾ Debian-derived digital forensics and pentesting OS ▾ Preloaded with over 300 penetration-testing programs ▾ Highlights: Metasploit, Aircrack-ng, Wireshark, Airodump- ng, kismet and Social Engineering Toolkit.
  • 17.