HACKERZ CLUB V 2.O
Wifi - Hacking
WIFI – WIRELESS FIDELITY
 Wi-Fi,

is a popular technology that allows an
electronic device to exchange data or
connect to the internet wirelessly using
radio waves.

 Wireless

access allows users to connect to
the internet from any location within range
of a wireless access point.
SOME BASIC TERMS


MAC address or physical address is a unique
identifier assigned to network interfaces for
communications



Access point >> Wireless router



SSID (service set identifier) >> Network Name



BSSID (basic service set identification ) >>
MAC address of the access point
BASIC WORKING
When a user uses wireless internet they generate
what are called data “packets”.
 Packets are transmitted between the wireless card
and the wireless access point via radio waves
whenever the computer is connected with the
access point.

BASIC WORKING CONTD.


Depending on how long the computer is
connected, it can generate a certain number of
packets per day.



The more users that are connected to one access
point, the more packets are generated.
WIRELESS ENCRYPTION
 The

main source of vulnerability associated
with wireless networks are the methods of
encryption. There are a few different type of
wireless encryption including:





WEP
WPA
WPA2
WEP
Stands for Wired Equivalent Privacy.
 WEP is recognizable by the key of 10 or
26 hexadecimal digits.

WPA OR WPA2
Stands for Wi-Fi Protected Access
 Created to provide stronger security
 Still able to be cracked if a short password is used.
 If a long passphrase or password is used, these
protocol are virtually not crackable.




WPA-PSK and TKIP or AES use a Pre-Shared Key (PSK) that
is more than 7 and less than 64 characters in length.
USING BACKTRACK >>
 Some




Basic Backtrack Terms >>

Wlan0 – wireless interface
Mon0 – monitor mode
Handshake –
refers to the negotiation process between the computer
and a WiFi server using WPA encryption.
 Needed to crack WPA/WPA2.


Dictionary - consisting the list of common
passowords.
 .cap file – used to store packets.

MONITOR MODE


Monitor mode, or RFMON (Radio Frequency
MONitor) mode, allows a computer with a wireless
network interface controller (WNIC) to monitor all
traffic received from the wireless network.



Monitor mode allows packets to be captured
without having to associate with an access point
first.
TOOLS USED
Airmon-ng >> Placing different cards in monitor
mode
 Airodump-ng (Packet snniffer ) >> Tool used to listen
to wireless routers in the area.
 Aireplay-ng ( Packet injector ) >> Aireplay-ng is
used to inject frames.






The primary function is to generate traffic for the later use
in aircrack-ng for cracking the WEP and WPA-PSK keys.

Aircrack-ng >> Cracks WEP and WPA (Dictionary
attack) keys.
LETS HACK 

Wifi hacking

  • 1.
    HACKERZ CLUB V2.O Wifi - Hacking
  • 2.
    WIFI – WIRELESSFIDELITY  Wi-Fi, is a popular technology that allows an electronic device to exchange data or connect to the internet wirelessly using radio waves.  Wireless access allows users to connect to the internet from any location within range of a wireless access point.
  • 3.
    SOME BASIC TERMS  MACaddress or physical address is a unique identifier assigned to network interfaces for communications  Access point >> Wireless router  SSID (service set identifier) >> Network Name  BSSID (basic service set identification ) >> MAC address of the access point
  • 4.
    BASIC WORKING When auser uses wireless internet they generate what are called data “packets”.  Packets are transmitted between the wireless card and the wireless access point via radio waves whenever the computer is connected with the access point. 
  • 5.
    BASIC WORKING CONTD.  Dependingon how long the computer is connected, it can generate a certain number of packets per day.  The more users that are connected to one access point, the more packets are generated.
  • 6.
    WIRELESS ENCRYPTION  The mainsource of vulnerability associated with wireless networks are the methods of encryption. There are a few different type of wireless encryption including:    WEP WPA WPA2
  • 7.
    WEP Stands for WiredEquivalent Privacy.  WEP is recognizable by the key of 10 or 26 hexadecimal digits. 
  • 8.
    WPA OR WPA2 Standsfor Wi-Fi Protected Access  Created to provide stronger security  Still able to be cracked if a short password is used.  If a long passphrase or password is used, these protocol are virtually not crackable.   WPA-PSK and TKIP or AES use a Pre-Shared Key (PSK) that is more than 7 and less than 64 characters in length.
  • 9.
    USING BACKTRACK >> Some    Basic Backtrack Terms >> Wlan0 – wireless interface Mon0 – monitor mode Handshake – refers to the negotiation process between the computer and a WiFi server using WPA encryption.  Needed to crack WPA/WPA2.  Dictionary - consisting the list of common passowords.  .cap file – used to store packets. 
  • 10.
    MONITOR MODE  Monitor mode,or RFMON (Radio Frequency MONitor) mode, allows a computer with a wireless network interface controller (WNIC) to monitor all traffic received from the wireless network.  Monitor mode allows packets to be captured without having to associate with an access point first.
  • 11.
    TOOLS USED Airmon-ng >>Placing different cards in monitor mode  Airodump-ng (Packet snniffer ) >> Tool used to listen to wireless routers in the area.  Aireplay-ng ( Packet injector ) >> Aireplay-ng is used to inject frames.    The primary function is to generate traffic for the later use in aircrack-ng for cracking the WEP and WPA-PSK keys. Aircrack-ng >> Cracks WEP and WPA (Dictionary attack) keys.
  • 12.